Author: unknown
I am a hacker
These days have to be better, because I just bought a
15
'
LCD monitor. Maybe you will think that I have the previous special 17 "monitor should be very prestigious. Oh, in front of one more than 15 hours a day, the distance does not exceed
30 cm
People say. That CRT display is definitely a scourge! Eye red, full of blood. The hair is falling off, loss of appetite, is particularly afraid of light, and these are absolutely unreasonable with that CRT display.
Analysis of this attack target has been more than 1 week, but there is no progress. However, I can't worry, occasionally on the chat room, and smile with MM. However, in the mind is actually thinking, TMD, is there really no vulnerability?
To break a more professional website, where is it so easy? Is there a fool? This world is not much more than anyone else. The computer's knowledge is that something, the people who understand is actually as a thing, don't look at the new noun, a pile of piles, in fact, it is white, there is a lot of things in the things and ten years ago. Especially for our special offensive others, in our eyes, any procedure is a person who compiles an instruction, and it is not much different. I am bored online, just enter a forum, just look at it, I will see a post, may be sensitive to hackers, just look at it, seeing it is not something else, just a post: 3 minutes Black down a website. A "Niu Man" explained in detail how he scored a computer in 3 minutes. There are a lot of reputation behind. This old brother is a "hacker" master image.
Oh, I can't help but laugh. There are too many online things. Now many people feel very mysterious about "hackers", including a lot of professionals, plus a bunch of "computer blind" directors, "hackers" this thing is almost unable to raise their own value. " Magic ". You now say that you know the computer, there is no one "bird" you; people who understand the computer casually on the street, 10 have 9 understand, and one is "computer master". But as long as you say that you are "hackers", then many people will look at you very eye-catching. Oh, it is so strange now. They are the directors of "computer blind".
Look at the old brother who post the post, the other party did not set a password. Haha, thanks to it, if there is so many things, what is the uploader, what is remote, what is connected, what is the door. Only, decipher the password, it is just slightly tape, just a few words, password is empty! But I still noticed it. I started laughing. Haha, the administrator password is not set, it is a person who knows a computer, it should know if people set the password, your steps are fart. I know the password, those things behind are things in the network operation course. With "hacker" has a fart! Hahaha. . . . . . .
I never said that I am "hacker" online. It is not to take someone to know that I am black. I am actually afraid that people will ask me to ask for a certain website. I will never come to the table. For example, in the face of a cute MM's pleading, how do you answer, promise, you think that black a website is like 1 3 = 4, can you use this simple everywhere? Any website was decipherous, any hacker didn't dare to say hello before, unless he had already turned the site. Don't promise, MM will say: Hey, I also said that I am a hacker, I don't practice, it seems to be a liar. . . . . This is not a fatal blow to me just set up. The hacker has actually succeeded by luck and perseverance, and of course the technical skill is also more important. Bored, these posts I have seen each time every time, then I will know the content. Then I am silent, of course, sometimes I can't help but laugh. But too much, there are fewer and fewer laughs, but I still laughed today, the "cattle" is really cute. Ha ha. . . . The mind is still thinking about my goal, a military website of the US Navy. I have already scanned many times. They use the Apache's latest version of HTTP Server. Using UNIX, specifically, SCO UNIX, version from feedback information should be 7.0 Scounixware. But I know that this is not necessarily accurate. Now modify the version to make you know the mistake is a popular method. The port opened 80, 21 and 20, and then four of the 4410 port managed by remote login management. There is still a person in the US devil's navy, basically break your mind. 21 and 20 are obviously used as FTP, and the FTP service procedures he use is actually VSFTP1.2. by! That is the most stable and safest FTP server in the world. The meaning of VS is the meaning of Very Security. From the name, you can know how powerful. To be honest, this place is very small, the function is not very powerful, but the security is really blown. I haven't publicly open this VS record now. I have encountered many times before. It is not successful, all from other ways, now I have encountered this stuff. It seems that the other party's administrator is also a line.
Apache is the most widely used HTTP Server in the world. It is also almost impossible to break him. Countless masters of practices prove that this is definitely a very hard bone. I am not a god. I am just an ordinary person, not more than a head, whether you feel that you will affect my image. But I still tell you, I have no way. In fact, the general Unix and Linux hosts will leave the mouth of the remote login, but you don't have a password, still useless. What, decipher password, huh, you think this is an email mailbox.
The password of these administrators can be said to be a no longer who have no ancient people, can you guess? Moreover, it is not correct to log in three times, will not be connected to you.
There is no way, just in his website, I think, whether I have given it. The US Navy's equipment really TMD is good, and the treasures of the soldiers are really good, there are many pictures on the website, and there are soldiers engaged in the racing competition, all the racing I have not seen. Really rich. Hey, in addition to suffering, we have been a hardship, there is nothing. But fighting, they are definitely not as good as us.
Suddenly enter a club login entrance, see a landing box. At first glance, it is a similar BBS-written interactive interface written by PHP. Just register a name to go in. Wow, it is a small community, some administrators, ordinary people, and administrators can upload documents. Of course, I am now just an ordinary person, no uploading permission. Haha, my brain is a flash, if I can upload the file, huh, huh. . . Maybe you can find a point vulnerability. I don't dare to affirm it. So the netizen named the administrator of Caption Tom fell into my sight, decipher his password and it was much more likely to be on the BBS. Moreover, that CAPTIONTOM will definitely not be a professional. Oh, he will definitely have a sudden time. . . it is good! I stared at him. . . I thought here, I immediately had a spirit. Dry our "hacker" work, on this virtue, usually like a hen to die, but once there is idea and goals, it is also possible for 3 days of excitement. Oh, this Caption TOM made me subsequently invaded this preparation and its complete system. However, this administrator I admire, obvious, people who do web pages are obviously not that administrator. Otherwise, I am a little way.
2, I broke the US Navy website (1)
It is the administrator named Caption Tom into my goal. He is just the BBS administrator, everyone everyone is online, you should know that BBS administrators do not necessarily be responsible. Usually the ability of the theme of BBS, such as this BBS is singing, his administrator may be a master of singing. I haven't figured out that Caption Tom is an administrator who is responsible. I just care about his password, and his upload authority. It seems that he is definitely not engaged in technology, otherwise it will not be so unhappy, let me drill the empty. It's really a bit despicable, I'm really sorry. Oh, there is no way, who told me "hacker", in order to break this website, you must have a means. Let those "hacker" describe the use of TMD mobile phones to attack the "SB" director of the people's military website to see ghosts. Hackers are people, not playing magic!
With the goal, I started to have a spirit, this spirit can definitely don't eat in a few days. First of all, I saw the login name of the CAPTION TOM, that is, Caption Tom, because I will use it in the name of the BBS when I log in. Oh, it seems that this designer may think that the BBS administrator does not have much impact on system security, so there is no business. But for me, I actually got his login name. If I design BBS, my administrator account will never use the name you can see in the forum. At least one of the people who want to decipher the password! But now almost all BBS administrator accounts are used in the login name in the forum. Oh, this old American BBS is no exception, everyone who copied who I don't know? Therefore, all BBS programs can find the same place. Now, I must have a password. First of all, I will now Test, the password plus' OR 1 = 1 method, I hope that the BBS designer is not a rookie. Of course, it is certainly not a rookie, so when I test, I get the password incorrectly prompt. This method is not available. I am not disappointed, what is disappointed? If you expect to think about the website of others, is it a hacker? It's not much like this "cattle". Ha ha. Then I looked at the source code of the web page of his landing interface, the submission statement he landed was removed. He uses a Post method. If he does not limit the number of landings, I can basically announce his death penalty. Because the password is below 8 bits, according to my current 10m
Bandwidth network speed and my AMD1600 machine, it can not be used for 2 days, it can be deciphered. What, you are using
10m
And amd1600 , too uncomfortable? Oh, I see you is a movie. You think that hackers are used as a computer like a movie, which is all the network you want to do more? Don't look at my network
10m
Bandwidth, even the website of the United States, can have
1M
I am very satisfied with the bandwidth. In fact, I am still not connected.
1M
. Now see if you qualify the number of landings. I know that the general BBS does not limit the number of landings. why? Not designers don't understand, but to prevent account locks. You think, have many people to take the administrator's account in BBS? If you encounter 3 times, you will lock him, and that administrator still does not work? Every day administrator must send Email to the system administrator, told him to let him unlock the account lock, once, no problem 2 times, if there is a 10 times, 100 times, even thousands of times, the system administrator does not commit suicide strange! But people who do this BBS must have considered this issue. This is what I later found later. He didn't lock the account, but you entered 3 times in a row, the password is correct, saying that you are the correct person, let you enter, if you exceed 3 times, you will not let you enter, even if you enter the correct password. If you can't, give you a prompt "Invaild Password!" Invalid password! The account is also not locked. This trick is actually very simple, many people can think, but for those of our password, it is indeed a trouble. However, there is no relationship. I have already dealt with the technology, I call out the procedure I write, a tool specially testing the page password. Written with Delphi. Oh, don't laugh, not I will write it with compilation or C. Instead, it is not necessary. Those who use tools also measuring a level of a person is a rookie. Things to do with Delphi for a few hours, use assembly or c to use it for a few days to finish, the effect is the same. I don't have to delphi is really sick! The interface is very simple, an address box, a password dictionary import box. First use my existing dictionary to start testing. In order to prevent the other party from limited to 3 times. Every time I trory each try, I will automatically modify the IP address. I have a C class address that can be changed. Fortunately, the other party did not verify according to the Class C address. Otherwise, I really can't do it. Many people think that their address want to change what is, in fact, it is wrong. You think, you change the IP address, if you are not inside your subnet, the data sent back by the other party cannot reach your network. You said that you will be clear in Beijing when you write a letter, you have to leave a Shanghai address, the other party will receive it when you pay back this address? Don't listen to those SB director talk! The dictionary was finished for 10 minutes, it seems that the other party CAPTION TOM is not a rookie, at least his password is not in my dictionary. Hey, it seems that there is no way. I have to use "exhaustion Dafa". Don't look down on this world's most stupid method, this method is the best way when there is no way. Everyone understands, but no one can prevent this method. Unless your program does not give it. Through the previous analysis, I feel that people of this website will not be a rookie. Therefore, the password will start from 6 digits. It turns out that this intuition is correct. I don't know why, I think his password is definitely 6 or more. I have produced my exhaustive password dictionary. There are more than 60 M, which is big.
Opening the machine, starting automatic analysis, starting to jump a number on the screen, and a silence around, quietly, I can hear my heartbeat. I am not in a hurry, according to my experience, my AMD1600 seems to be destined to work for 1 day night. . . . . . . Let him jump. I walked to the living room, turned on the TV, now it is 10 o'clock in the evening.
Sorry, let everyone disappoint. A person known as a hacker does not enter the correct password within 1 minute, and make a success, show my style. Take a look at TV, turn on the TV, see if our mentistened TV stations have a good look. Oh, it is really a pot that doesn't open, life is really full of dramatic. You love it. At the time, it was just placing a TV series, and it was just putting a hacker to enter the financial system of people, stealing information. At that time, the hacker came, very confident, and he knew that he was definitely able to attack the people's system in a few minutes. If you don't have the expected, his fingers are flying up and down on the keyboard, but you will know that it is a person who has never touched the computer, because you know that he only knows his fingers, but his finger knocked on the keyboard. No, what button is used, he is a little. It is a two words "tapping", I was happy at the time. Hahaha. Then it's more cow, a window that requires the login is coming out, ask for the password, between the "master" brow, the sweat is straight, it seems really very fluent. Then, after 3 minutes, who is on the screen's voice: "Congratulations, your password is correct, you can enter", then the master will make carnival and disdain, next to the person is surprised and admire. I laughed at the sofa at the time. Hahaha. . . . . I just want to say to those who don't understand the computer, that is not a hacker, he is definitely a fortune. He should go to the sports lottery, the sports lottery is only 7, and it can be calculated for him 1 hour. I rely! I rely on it again! By the way, I will say a friend who is going to shoot a movie (now I don't say any movie TV, saying it is useless), you don't know if you don't understand. There is a lot of money, and it will find a computer professional student for your consultant, can spend a few more money? Give a few hundred faster, people are not happy. Ensure that you don't make such common sense errors. I found that our domestic director feels your most cattle, I don't understand the computer clearly. Do you admit that the music does anyone say you? If you don't understand, you will find someone! The foreigners are good, and when you look at people, those model designers are famous automation control professionals in the industrial community. It can be said that it is a collection of technicians. You see the effect of people.
3. I broke the US Navy website (2)
The numbers on the computer screen are still beating, my luck is always bad, and the biggest award in this life is consolated. So, I have never touched the test for a few minutes, the password jumped out. I am used to it now. TV is too ugly, the central government is making a program, specializing in innovation in their programs, that is, they let a singer selling newspapers, then hiding in the car, shooting the singers, and laughing the staff and laughing the staff. The camera's lens is broadcast together, they call "major innovation". The disgusting of the horse fart. Oh, these means are the means of can't use it again. It actually "significant innovation", or they are thick, or they don't look at Taiwan, may think too low. I have never seen Jin Yong, I dare to take Jin Yong, and people really want to be!
Forget it, turn the stage to the animal world, I think the best program is this program, at least the animal does not put it, what is the job?
Bless, the mobile phone is ringing, there is a text message. It is Xiaomin. "Why don't you last QQ, what is your bad things?" The girl is blame, Xiao Min is nothing, she is not directly calling me, always sending a text message, hairdry all day long. Sometimes I am willing to die. I remember the last Spring Festival, I was in the New Year in my parents. I faster than 12 nights in the New Year. I was here. I definitely be the words of the New Year. I am not thrilling, I am very angry, wild, we Cooperation is strong. Tonight to grab bank. Seeing this, I have been puzzling in my heart, who, this is? Continue to see: The adapter is: .... Happy new year! Small sensitivity. Haha, I rely on, this died. I was turned on at the time. After 5 minutes, I went back to God, and then sent this news to all the people, and then called the dead sibei. She actually asked if I received her congratulations? I halo, I can't wait to reach out from the phone online, I can't feel the sweetness in my heart, and I feel like it is still intoxicated. Ha ha. Hey, Xiao Min wait for me on QQ. That AMD let her work. I'm too ideal for my IBM notebook. Take my IBM's book, move to a coffee table, and start the Internet. Although IBM is just a C500, write the program on the Internet or notice. IBM's book is really cattle, more than 3 years, this book is not out, the real point is not out, even though I fell 3 times. I don't admire, one to summer. Others don't dare to put a knees, IBM, warm temperature, heat dissipation technology is indeed unique.
Once the QQ, Xiao Min's avatar was frivized, it seems to call me. Her net name is MM, I originally sensitive meaning, I have a nickname for her. But now the online understanding is the meaning of my sister. She is also happy, saying that this name will know that it is a beautiful woman, and it can be attracted to handsome guys. I almost vomit blood. My name is called GG. I originally called Superman. Such a sense of masculine is for her, and she is not careless.
She always smiled, I should ggw, it is Gege. I turned over, she laughed.
I sent him a message: "What? Can you call?". She said: "Hey, is this not your favorite way?" I said: "嘿".
"Can you accompany me to with a friend in tomorrow?" I know that it is not necessary. Think about the computer should still be a password, anyway, it is bored, and the computer is such a small CASE. But I haven't been to the computer city for a long time, I will see it. "No problem" I answered. "Hey, my friend has a special money, I don't understand the computer, you give him the best, save money, just more people's computer cow!". I am dizzy, I estimate this is her friend's original words, otherwise I can't say this style. Later, I knew it was a boyfriend of her girlfriend. Why is this a large number of people who use the best computers in the world that is not a computer? Lord, give me a silver.
The time in the computer city is very fast. Xiao Min took my hand and was happy to be like a small rabbit, and I was too small to stay with her. Although in a city, it is actually the main way of our exchange through QQ chat. She is a doctor, an absolute line of computer. But seeing my confident and the businessman of the computer city bargaining, talking. She is also very happy. I think I should look very handsome at this time. Her friends and friends of boyfriend, followed by our ass, looking at it. Anyway, there is no matter if it goes back, the password will not be so fast. So I am also happy. Choose it slowly. In fact, it is more than 1 hour. Configure it to the installation from the configured installation. At that computer, telling the truth, I am envious. It is really a cow! The speed is much faster than my AMD1600 . It is Intel's chip. To tell the truth, AMD is really not suitable for the computer. With a set of advanced audio and a top sound card. At that time, Xiaomin was tested on the CS above, and I saw it itchy, I later felt, it was really good. Xiao Min, playing computer is stinking, but playing games, I am always not her opponent. She said this shows that my IQ is very low. I said that my major is good. When I go to school, the door is excellent. She said, it is dead, not. She is a medical doctor, I have been suspicious, my IQ is really a bit low, I am very difficult to guess the password of others. Walk away her friend, we have two hip hosses, more intimate. After eating McDonald's, we returned to my house, this is a set of two rooms in the unit. In fact, I have always thought about it again, how is the password? In the house, rush into my study and see the screen. The screen has entered the protection status, and I am sophisticated to move the mouse. The number did not be jumped. The password came out. It is a 12-bit password. I am happy in my heart, I feel a lot. Today is really good, and the romantic of MM has a day, and I went to the computer city to see what I like. The analysis of a week has finally progressed. What happened today, what is good? Is it touched me?
Xiao Min came in, looking at my eyes. Have a bad laugh, say: "What are you doing?" I smiled: "Nothing, analyze a program." What I am hacker is that I can't say it, because hackers have been shaped into a back role. She is absolutely unable to take my own GF. Every time we play CS, it is her policeman, I am a bandit. If there is any other person, she must have to be a policeman with her, absolutely can't make a vision. So, I am going to play CS in the Internet now to choose CT directly. "I want to play games, I want to play games", when there is no outsiders, Xiaimi is cute gentle. Some little 蛮, but it is very cute. It's rare so happy, of course, let her use my good machine. Start playing CS. I know that she is playing this, not 2 hours. She dare not be interested in other things, but for the game, it is interested in the game, what game is in her hand, can't take a few days, it will not work. Her games are all I teach her, such as a red alert, CS, etc. Now I am far from her opponent. I have always doubt that my IQ doesn't have her high.
She is very happy to play, I opened my IBM, I made my things next to me. On the side of her chat, this feeling is really cool.
Find a password. I already have the right to upload. However, this does not mean that I can enter this machine. Because I can upload the program, the program cannot be executed on the Server. This is still useless. Often see a lot of security check software on the Internet said: Your FTP has write permissions, is a vulnerability. In fact, this is not a vulnerability, even if you have the right to write, you can only write those data. For the system, you are still a point. Hope to execute the program you upload on Server. If you are sick, it is the administrator! Let's take a look, whether the uploaded directory is inside the APAHCE's web directory, if that, I may ask this program through WWW Server. Between Xia Min talking, I have tried it I can think of all possible. Didn't succeed. Think about it, the other party's administrator is so powerful, how can this low mistake. It seems that this FTP and WWW are strictly separated. I can only think about other ways. Continue to visit the administrator's identity on BBS, although a little dangerous, fortunately, the Caption Tom seems to be online today. There is Xia Min called the little call. She played CS, Over, waiting for the gap to start, I will play my happiness, I will play my back with my fist, I will use my hand card my neck, I suspect She is born to a little violent tendency. Otherwise, a girl family, how do you like a violent game like CS? So this makes me paralyzed, I am very embarrassed on the BBS. But when you don't care, there is often an unexpected harvest. I suddenly found it on BBS, and the administrator can post the upload attachment when you post the post. This attachment is in a directory of WWW, and this directory can be accessed by WWW. Oh, this website is written by PHP. Don't I write a PHP code? The script statement is not complicated, I am fine. There is a few, such as reading the file, write files, etc. The most common for hackers. I wrote a download program immediately, and I made a password file under Unix's Passwd, and I won more than half. But I tried it, failed. It seems that the administrator has set up the permissions of the Passwd file, and there is no way to read this file with the permissions of the Apache process. Think of other ways. . . . . . . .
---------
4. I broke the US Navy website (3)
It should be said that I can make my own program run in that server, I should succeed a half. But although I made, there is no root permission, I can't destroy the destroyed data, destroy the web page that destroys the other party. These are typical "rookie" practices. I don't care for it. A trouble, people's administrators don't know? With their technical level, can you still enter? My IQ is not high, but it is absolutely not stupid. Xia Min may play a game to play a little annoying, start playing me. I am more time to play me. I am basically sweet and her, I don't know how to make it, my thinking is not on this website. Oh, don't misunderstand, I and Xiao Min although I have been aware of three years, but now we are just staying in the latch card, gently mouth. Not that I can't, but I have my principle. Of course, it is a normal man, but I am with Xiao Min, I just feel sweet, I have never thought about how, no matter what you believe, it is like this. Several times, Xiaomin is impulsive, but I have grasped. Talking about falling in love, it is best not to do things. This is my principle. Now I still don't know if I can come together. So, I have to stick to my principles.
"My computer is a little strange these days?" Xiao Min looked at me, she was over in CS. "How to pull?" Xiaomin's computer is a given, more expensive than my computer, use P4
1.6G
of. LCD monitors. No way, she has money than me.
"These days have a slow speed, and some advertising boxes will pop up with a browser, turn it out, annoying,"
"I doubt that I am a hacker" Xia Min adds a sentence.
I glance, huh, I don't dare to laugh at her. This is some malicious web page modified her IE settings and registry. It is not a little annoying. I know that this is nothing to do with hackers. I just wondered how she would suspect that there is a relationship with hackers.
"How do you know that it is hacked?" I deliberately asked.
"Oh, you don't think I don't understand anything. Our unit has worked on computer training, I am a good job. Our last chapter is network security, our teacher said, now hacker is everywhere, they are very powerful, think Enter your machine to machine, want to control your machine, you can enter your machine. When you play Iraq, it is a hacker to make Iraq's control system failure. Haike can unify the world "Xiaomin's eyes start to release brilliance, Look out to a hacker full of unlimited year.
I started laughing in my heart, but I didn't dare to laugh, I hacking, I am a hacker, you bf is a hacker, why didn't you see me unified world. I bought instant noodles or gave money. I went to the ATM to take 100 pieces, and he won't give me 200 pieces. I dare not laugh, I don't want to be repaired by Xiao Min. Moreover, I saw that she was forwarded to hackers, I was also beautiful, if one day I said to her: Actually, I am a hacker. Will she fainted? The heart is beautiful, the smile on the face has also overflow.
"What do you say, hey, if you have been hacked, I don't have a way." Small sensitivity is self-speaking. Xia Min just knows that I am a computer worker, she doesn't understand the computer, so many things I have not given him. I am in her eyes, and there is no difference between the administrator of the microcomputer in their unit. This is not good, in front of MM, can't lose your face. Men's good strength made me woke up immediately.
"I will send you a program to your mailbox, go back to open the execution, just ok" talk room, I have sent this program to her mailbox. In fact, this app is not written. I downloaded online, don't think I understand anything, but I have to write this procedure, I must also check a lot of information, such as the modification of the key value of the registry, wait, trouble is dead. It is better to use people's things.
"Can you travel? Our teacher said that hacker is anti-fighting." I saw her unlimited worship for their teachers. I was a bit jealous. I don't have to ask, their teachers must be a man, maybe it is a handsome guy. The computer training is generally young. This everyone knows.
"Oh, you will say that you will say empty words, hackers are so powerful, hackers are not so much, people are full, what is your computer? What is your top, you are not a hacker, it is Visit the webpage with malicious code, modify your settings, there is nothing big. There is also the failure of Iraq and the hacker. Don't listen to them. "I finished it, I feel someway. But what I said, but after the word hacking, this word did back a lot of black pots, like viruses. When many people can't explain, he will pull the hacker and virus out of the back. This is a very reasonable explanation for those who don't understand. And you can have steps. Just like some Chinese medicine in my country when he encounters his disease that cannot be solved, he will not admit himself. He will give you a prescription. As a result, what is your first drop of the first drop of the first drop of a mountain, a certain sprouted root, etc. Rely, do you say that you can find these ghosts? N't you find? Sorry, not what I can't do, you can't find medicine. In fact, this is a lie. Now I don't know who is the first time, the Gulf War is an American hacker to the control system of people to implant the virus. Now everyone is actually believed. This is totally long. Do you think, will you connect your own army to the internet? Especially during the war. Iraq did not eat pork, haven't seen pigs yet? It is definitely not along with the civil network. Even if you don't even have any hackers? Even the internal servers in our unit are not connected to the Internet. Not to mention the army during war. Even if you send spies into the internal network of people, I have made it destroyed, and people will definitely have a recovery plan. Is it now that the ordinary network management can be recovered within 24 hours, not to mention the army? There are at least 2 sets of emergency programs. What, do you continue to send a spy? Really thought that people are pigs, they have been done once, and they will be brought the second time. After the first time, their security departments are looking for you everywhere? You also collapsed to engage in the second time, don't want to live? Everyone puts the United States myth, I am dealing with their administrators every day, and they are also ordinary people. "Will you be a hacker?" Xiao Min asked. I am shocked, I saw that Xiaomin had already exited CS and was playing bomb superman. This is a simple game, she chats while playing with me.
"You will not ..." Xiao Min added another sentence.
"I ..." I hesitated, what should I say? I told her that I am trying to enter the US Navy website now? I don't know the attitude of her for this matter, I don't dare to answer.
"How to pull, how about it will, what?" I decided to test it.
"I will show me, you are also engaged in computer, people will, how can you not?" Xiaomin continued to play bomb superman, and that game did not need too much attention. It is only necessary to move the machine and put the bomb.
"Hey, is your teacher?" I laughed.
"Of course, I will pull, our teacher gives us online security, can you still?" Xia Min was very sure.
"Have you seen his website of the black people?"
"No, our teacher said, black and other websites are crime"
Hey, in fact, I know that their teachers are not afraid of breaking the law, this is an excuse, and their teachers may really don't. I think, if you let you see the computer decoding all night, would you still think this is a performance? In fact, there are many meat chickens, there is no problem for MM performance, and very smooth and fast, it will definitely make her surprised mouth can't be closed. But can I? "Hey, will you won't you?" Xiao Min asked.
"You are not afraid that I am breaking?"
"Oh, just show it, as long as you don't make it destroy, what should you do?" Xiao Min smiled.
If you are any other person, according to my character, I will say "no" in the first sentence, break his thought. It is estimated that only Xiao Min knows that I can black and others, in the eyes of friends, I am also a "computer master". However, this person is a bit stronger in front of people who like. Do you not say that human nature is multi-face?
"Of course, I will pull, small carated" Since I admit, I will say something to the words.
"Really?" Xiao Min stopped the bomb superman, immediately by the other party bomb behind the butt, the attack, he was sacrificed, and the other party made a laugh. Xiao Min did not care, she stared at my face both eyes. I saw her achievement over more than 300 points higher than the other party. "Come, give me a performance".
I have never seen Xiao Min is so diligent. She got up from the chair, pulled me, and I was on the chair. Then, her self-polite is on my leg. One hand holds my neck, see as screen, waiting for me to perform. Xiao Min is not short, 1.65 head,
48 kg
It is a bit thin, the body is absolute, and it is a person who is not fat. So, her friends and colleagues are the most envious of her. She is a short hair, the skin is very white, long is very like the Ouyang Lanlan in the "never-ignorant", Yuan Li. I only 1.70, now it is absolutely not high in men. A bit slightly fat. She never dare to wear high heels. I am afraid that I have an idea. In fact, I don't care, I think the woman wears high root shoes to show the softness of women. Now she is this Pose, let me have a bit of Yuan Yi Ma. Her faint fragrance is smoked under my nose, I am a bit confused. I have a hand to cover her waist, one hand grabbed the mouse.
How to perform? I start thinking. If I pick up my broilers (I have been overcome by I have a computer), those are servers, basically the characters, enter the command, there must be no magic in Xiao Min, you said that you are an administrator, he also Don't understand, for them, you must use the way of performing the way of performing the way.
I started to operate. I started to start the scanner and started to sweep our internal network. There are more than 10 people in the subnet segment where my computer is located. So I can use other addresses, I have said that I have a Class C address because of this. Of course, I moved his hands on our exit router. Oh, but I won't get any damage. The rabbit still don't eat the woven grass, I am stronger than the rabbit? According to my experience, there are many rookies in our internal network. And all of the Windows systems. My scanner I opened is the streamer that everyone knows. This thing is very useful to deal with the robots of the rookie. Sure enough, after a while, 3 network sections were swept, found a dozen machines with vulnerabilities. Xiao Min looked at it, although it was awkward, it was still looking forward to it.
"Found", I see a computer name called ZCW, 2000 professional version. His password is actually the name of the computer. Oh, don't laugh, many people make this mistake. Of course, I have now a 100% grasp. Now is the uploader, start his Telnet Service. Then the remote connection, put a screen monitoring software. Then start the client, and the other screen appears on my machine.
"Getting" I confidently answer, MM eyes really shine.
"Wow, you are really powerful" she pinches my face.
Hey, I am this MM, according to this, you should give me a sweet kiss now. But she just likes to express her appreciation with her mouth. Oh, in fact, this low-level gant is most effective to MM. In her eyes, I am attacking the US Navy website. I have never seen the other side of the screen so excited. In her eyes, I saw the other party. The screen is definitely more difficult than I have ROOT permissions in the US Navy website. Her tube, now the best method is not to explain, explain that she doesn't understand.
Then the MM starts to make a small call and start participating. First of all, she saw the other party's QQ number, the other's QQ is open. The head of this dead Nizi is absolutely easy to use, and it does not admit it. She actually opened QQ, like the other party asked to chat. The other party may see that she is a MM, I accept it, then they start chatting. I am watching MM next to it, enjoying it. MM is excited, while talking while laughing.
The other party asked: "Who are you?
MM back: "Don't worry, anyway, I know you"
The other party asked: "How do you know me?"
MM back: "I know you are a certain unit"
The other party was apparently surprised, and immediately said a string of him thinks that it may be MM's name.
MM is back: Not. Then just laughed.
MM also said: "You are now playing the tank war to" on the screen, the other party is playing the tank war.
The other party is more surprised, and it has been half a day, "is wrong"
At this time, we saw that the other party had closed tanks, playing playing cards.
I can't laugh at MM, I have trembled with her.
MM said: "You are now playing playing cards."
The other party is obviously too amazed, and the screen is not moving, I don't know what to do. MM laughed, saying, he affirmed to see if he went to the room to see if there is a monitor. Oh, MM said that it is really true.
For a while, the other mouse started, and the time was returned: "You are really guess!"
Then he launched anti-virus software, it seems that he doubted his virus. I saw him using Jinshan Taxi. The file is fast and flash, MM asks me: "He will find us in an anti-virus?" MM didn't laugh.
"Reassure, this gripping software is special. Generally, anti-virus software can't find it." In fact, this thing is my own. I don't know if others know that anti-virus is not found.
Sure enough, for a while, the other party stopped anti-virus. He didn't find anything. MM started happy again.
MM continues to make a joke with the guy. It is a feeling that a cat is playing with a mouse. The MM is chatting with that person, while the other party is turned on. These operations MM are very skilled, after all, she is also working on computer training courses. Moreover, it has passed the computer level 2, although the test is FoxPro. I am also watching. I also want to know who this guy is. Because he is not my such network segment. Thousands of people in our unit, I can't know who is. MM turned, found a photo directory, it was some photos, I saw it, a bit like the department of our financial office. Then I have an annual report of a financial department. Yes, that is the person. Nothing is there. But I know him. Hay serious one. The next thing is awkward. MM actually turned to a directory. I didn't care, and MM opened one of the photos. God, actually came out of a SEX photo. Very clear and exposed, in fact, I am also old online, I have seen photos before. it's nothing. But now and MM is so close, and suddenly the picture is such a photo, do you say how embarrassment? At that time, I was stupid and MM, and MM didn't know how to make it, it stopped. Time is stopped. I saw MM's blush, I think he should also see my blush. Everyone is so staring for a long time. Don't talk. In fact, MM is a medical doctor, and it is surgical. This kind of thing should be nothing to her. If in us, I don't think she will be red. The key is that now is on my leg, then suddenly came out such a thing, you said, change you, what should you do? MM did not dare to look at my eyes. Then we start laughing, mm is an embarrassed laugh, I am a bad laugh. Then MM will turn that file. There is no courage to see the other information of the other party. MM is: "There are these things in this guy computer, not a good person!"
I said: "What is this, you are doing medicine, you should know this is normal."
In fact, I am thinking, I haven't seen it, this guy is so serious, and there is this hobby. Ha ha.
"Is there such a thing in your computer,", MM started to look at my disk file.
"Don't guarantee, is I doing?" I am not unanual. I am not afraid. MM often turns my computer. I don't put it on that machine even if I have those things. Even if you want to put it, I will use some means, except for me, you can't see it.
Of course, MM did not find any crime. So a lot, MM lost interest. I also flew out all the things I uploaded on the other computer.
"Do you like to see those things?" Asked Xiao Min asked.
"I don't like" I don't hesitate to answer.
"Do you like this?" Xiaomin asked.
"Others may, anyway, I don't like" I know that I may say me, but I don't want to be. " Ha ha
"What do you like?" Xiaomin looked at my eyes and said low.
I am awkward in my heart, my heart is unlimited, Xiao Min is really gentle, like only kittens on me. Xiao Min, my favorite is you. I am talking about the old truth, Xiao Min is my first girlfriend, I hope it is the last one. I looked at her eyes and said that a word: "you".
Xiao Min did started hooking my neck, and her lips hit me. I have a blank in my mind. . . . . . . . . . .
5. I broke the US Navy website (3)
Take away Xiaomin, the time is already 10 o'clock in the evening. Xiao Min is a local person. I'm not. Her family is said to be in the city, and I live in the north. So I just sent him a taxi, I didn't have to go to her home, I didn't know her family. I only know her unit, the best hospital in this city. She is in surgery. Their units are also in the north, so I went to her unit to wait for her. But she often comes to play here. Today, it is very warm, because there is a small Min. Now returning to my cool and simple study. It seems to be a bit lost. But I don't know what to lose, anyway, people sometimes weird. Close the window that is just Xiaomi opened, there is a small sensitivity and a faint fragrance on the mouse. I am not awkward. Tomorrow, so it is very easy to stay tonight, don't have to force yourself to sleep. Whoever has a mouse in a unhappy point, my heart gradually calmed down, Xiao Min gradually left my mind.
I returned to my goal. I carefully entered that website, the Terminal of the US Navy website. On the one side of his BBS, you wanted to further enhance your permissions. Just now I can upload some PHP programs. But I won his password file failed. How to do? I walked around and thought. I can now upload files and download any files under his WWW Server. It is no problem with his homepage. But this is not what I want, I need ROOT permissions. In order not to be discovered by their administrators, I immediately wrote a PHP program and traversed the directory and files that can be accessed under his WWW. Soon, I found the Log file of that bbs, a file called Access.log. Let's read a few words immediately, I read it back, too slow, because there is
200M
Big! It seems that the administrator of this BBS is also lazy, I haven't been cleared for a long time. At first, I immediately found that the Log file of BBS was immediately written, and all the records that had my IP address were all deleted. Oh, the file immediately smahes much. Do you think that I have a test password a day, and the thing recorded is a person who doesn't understand the computer. It should also understand what is going on, let alone those "old birds"? After deleting my account detection record, I am in a matter of my heart. I know the upload account of the CAPTION TOM. Suddenly, the light flashed, I don't know if his VSFTP is a virtual account, or the system account? If it is a system account, huh, you will trouble. Between the brain, the SSH connection client has been launched in his hand. Enter IP, type the FTP account of CAPTION TOM, enter the bus ...
Haha, I almost laughed, and I have a beautiful $ symbol in front of me. It seems that his VSFTP is using the system account. This is not blame administrator, because the administrator's FTP has opened anonymous, and the anonymous FTP account has been set to log in from remote, so you are gods and there is no way. This BBS administrator is obviously the system administrator specially takes care of him, so specializes in opening a private account, in order to remotely manage, and can also log in remotely. With the SSH protocol, there should be possible possible to be eavesdropped. However, he didn't think of the dream, I would connect BBS and this system's account, and I declapted the person's account. Not we are not enough, it is the enemy too embarrassing. I am a bit proud. . . . .
The following question is to turn yourself into root, which Unix is absolutely a loss. As long as UNIX gets his ordinary account and can upload files. Can perform files. That is a master, this UNIX is hit. I have two conditions, immediately see if the program can be executed. Write a simple Hello World program with C. Compile with GCC. Haha, no error, GCC is available, I have all permissions under this CAPTION TOM account. My mood is much easier, I have already felt that it is in front of you. . . . . . Here is to use overflow Dafa, as long as you overflow, you can see ##. Oh, in fact, the web page is the most loopholes. From him, you can usually find the gap. It is not very easy to start from the system directly from the system. First use me upload a UNIX overflow program, compile, execute, and laugh, waiting for that # 好, however, my smile is solidified. #No no appearance, and my SSH is also suspended!
Shit! It seems that it is an overflow program. Reconnect it immediately, oxi is stable, still not dead. everything is normal. Look at it with W command, it is ok, the administrator is not there. The current goal is to find a way to make him overflow. Invention This method is definitely a genius, which can be said to be anti-fighting, unix has been so many years, still do not solve this problem. Now in the case of almost no way, almost overflow is killing technology, but there is not much hacker that truly mastering this technology in the world. Who is this world's operating system almost written by C / C ! I don't say C / C is not good, in my eyes, C / C is definitely the most beautiful senior language in the world. In the past, it is now, in the future! Because C is too flexible, he does not check your border for your data, which means that when you enter the data, if you don't stop, he is a down. What consequences he will generate, he has been filled down, unless you call. But now many people don't know that this is the root of overflow. They are not to judge the boundary. Some functions including C. To now, I also admire people who want to attack with overflow methods. How did he think of it? by. The cerebon melon is really easy. However, I am sure that person is definitely a debugger master, and it is definitely a compiler. Because of the overflow program, even if it is a bad byte, the consequence is not the execution you think so. Just because this overflow program is a bit different from this UNIX version, it has failed. It doesn't matter, I'm going to pick up this bones, afraid of this? Oh, I started to increase overflow data, let the overflow address to top. A little trial. The boring work has begun, and time is a little bit. I have no such thing, but perseverance is absolutely, this is very confident. So my hand flying quickly tap the keyboard, failing once, reconnecting again and again. But did not affect my emotions. Oh, it is so bitter when hacker is doing this. no way. Those who write articles are very chic, or they are chic, or they don't really deciphery. In fact, it is not so much. I don't know how many times I tried, and I have seen it at 3 am. I poured a glass of water and drank a bite and continued to tap the keyboard. Suddenly, when I was preparing to carry out the next trial. The connection is not interrupted, the # symbol is out. I stopped that I have all inertial fingers. Long lost a breath, concealed the ecstasy in my heart, and overflow the address in the notebook. Next time, if you encounter such a system, it is not so hard. There is no sound around, I really want to find someone to complain, I successfully entered the US Navy Station! Hahaha. Take a look at the administrator? No. I lost a breath, I have enough time to work after work. It seems that their administrators are also night owners, come up with night. I was just him when I was sleeping. Haha. Glaze the guitar next to me, I sing songs like my nerves, the first, the blue sky, the blue sky is on the red sun, and the smile is still can't change, there is always something Smart, if you can't predict it. I am relatively light. I don't want to knock my water pipe neighbor. I gently sang, my mind suddenly thought of Xiaomin, thinking of our campus's wonderful time. . . I have a sweet in my heart. This song is also Xiaomin like it.
I don't have other hobbies. I saw crazy smoking in the TV to express a hard work. I don't smoke, don't drink, except for a small amount of beer and wines. Whenever I get a substantive breakthrough, I want to sing, I am still a famous campus guitar singer when school. The guitar is still the original, the strings have been changed many times, and the Qin face is also full of sturgeon. But the sound is still the same, there is no change. Gently caress it, just like a well, my youth. I don't need a listener, I sing again with my heart. At the beginning, Xiaome is hosted by my song. She said, although my song is written by others, but I feel that I am singing yourself. Sometimes I will record my own east and weeks. When I don't want to sing, I will listen. In fact, I am a person who is ingeusive. Who said that hacker is not too good? When you put down your piano, it has been 4 o'clock, my thinking is still clear, there is no sleep. Long-term staying up late, let me live at night, I am not good at work during the day. From our eyes, I can imagine that he may doubt what I have nothing, maybe I suspect that I may be likely. Ha ha.
The rest of the work is better, install the back door, remove traces. This is the basic skill of hackers. These for me, basically don't need to think. Because I use my unique way for the back door installation of the UNIX system, I haven't found it yet. Moreover, once I brought a computer, I usually not change his system. That is, it is possible that it will not log in again in 1 year, and the opportunity to be discovered is almost equal to 0 unless he reinstates the system. However, a professional Server is not as simple as reloading, so this problem is basically not worried. Carefully analyze this system and found that their administrators are really powerful, and are traps and monitoring everywhere. For example, the system program under his bin directory is all marked, as long as you move these procedures, you can find it immediately. The general hacker installation latte is replacing these files. So I want to change his documents, you will be discovered sooner or later. As for the rookie practice to built a root accounting account, it is not seen in the death.
However, these are useless to me. Because I will not use the file to install the back door. I am using the way to write the disk sector installed my code. Activate through the system's startup code. This is the same as the principle of guided viruses. Since I didn't move any file, I can't find me through the monitoring file system. I use a small connection program written by compilation. Equivalent to a Telnet service program, saved on the disk using a binary. The function is very single, that is, an execution system command function. For me, this is enough, the smaller the hidden hiddenness.
It is installed soon, but to activate must wait until the system is restarted. These professional Server is very normal for a year. So, in order to verify and now activate him, I will write a program immediately and activate him in memory. Use my special client to verify, OK, success.
Clean traces and exit. I put all my record files all about it. But I know, these for experts, still see marks, their file monitoring system is not eating dry rice. As long as I move the file, I will definitely find it. But there is no relationship, at least they don't know who is moving, they can only investigate which account is, but can't trace my IP, this is enough. The articles that are not left in the so-called cleaning marks are lie, this is impossible, unless the other is a rookie. However, there is no relationship, I have already quit, there is no signs of damage, it is estimated that although their administrators will doubt, change the password, but now I don't need their password. I have my own entrance. 6. Software Development Department and the War of the Network (1)
Many people, after entering others's Server, they are not always, afraid of the world, I don't know, what is also given to the Sniffer, and I want to get more passwords with people's machines. Haha, I want to say, this is a typical rookie practice. Do you really think that people's administrators eat dry rice? Do you really think that you are the world? Slightly a little better website, which administrator is not more experienced than those who write a hacker tutorial? Those administrators are all black and otherwise, you are a childish trick, people can't see it, then he really should go down. Most of the tutorials are the outdated tricks of passers-by. Don't think that people's administrators are fool, in fact they are quite powerful. Hackers are like an enemy-behind special forces, you are exposed, you will die. Don't listen to what is the lonely hero, that is blowing! The less you left, the better. The less it is, the less it is not easy to expose. And it's okay, try not to return to this website, enter it in an ordinary person. I have a habit, once I overcome a Server, I usually won't go back to the second time within 1 month. Even half a year will not go second time. It turns out that this is absolutely correct. I haven't been found yet. Of course, when I go to school, it is still the stage of the rookie, and it is not counted. Ha ha.
You think, those administrators are all powerful characters. They will soon find anything wrong. Therefore, in the last week, even one month will monitor, try to find what is going on. At this time, you log in again, are you not looking for death? You are amazing, you will be more powerful, you can sit in front of Server, what rights do you have? Will you write the program? People delete the compiler to delete you your compilation? So, Strong Dragon, you also fight the land snake. So the best way I will not come, you monitor, nothing. I see how long you can monitor. People will be ill, no one is no exception, time is long, there is no movement, it will be relaxed. I am also a Server administrator, I have this problem. When I found it wrong, I will immediately monitor the rights for a few weeks or even months. But the time is long, I see that there is nothing, it is loose. It is a problem with this problem.
In fact, a master, you will know it with him. I am often on the Internet, and now the cattle is very very. I went to a voice chat website to disperse. Just entered a room for 3 minutes. A cow rushed in, grabbed MIC, the cow said: "The people in the room, listened, you immediately gave me it, otherwise I will immediately kick you out. And seal up your IP, let you never go online, fast point!".
Oh, don't say, I really have an exit. I can see from his position that he is not a homeowner, so I am not afraid. Ignore him. Is the homeowner, he also can't blocked my IP. I didn't care about him, there were two people left in the room. The cattle continued to call, and continued to threaten IP to be sealed. I am really annoying, giving him a word: "Roll! Rookie!"
Haha, his guy may have never thought of meeting the cattle than him, it really gone. I laughed at the time.
Real masters, he will never give you technical issues. Unless it encounters people in the same way, and it is true if it is necessary. I usually not talk about hacker issues online. Even the computer is too lazy to talk, I put yourself into a singer online, I prefer to sing, listen to songs, chat. Life is a multi-face, isn't it?
Exited Server, I started to take a look at some casual websites. That goal became my history. Maybe many people say it, is it? Yes, it's it, I have made his control rights, what is going on? Not right, this is the US Navy website, how do you not do something information, what aircraft carrier design, or missile design, or Iraq's Cipher? Is this not very easy?
Hahaha, or how can I? The director is TMD SB? That's the problem. Everyone is too deep by the poison of people. If you don't say lie, you will become truth. The summary of the former people is really brilliant! Please, this is the website of the US military. They are all written. How can the things that are really military data may open outside? You said that will our country's confidential information will put in Beijing Library? Even if there is strict regulations, it is not allowed to borrow. But you said that you may come to Beijing Library? Obviously impossible. Similarly, do you say that the US military in the information level may connect your own network and civil network? Those things that use civil network entering people's military extensive place are long! How can it possible, people have not been connected to you, your ability is high, can you enter? Does the big house think that there is no hacker in the United States, or if the US military does not know what hackers can do? Halo, they are hackers' old ancestors, is it good? They don't stupid to their confidential databases to put it on the Internet, just have an account to access the point?
Hackers are not God, that is, ordinary people. Often see some people say how hackers enter a certain bank. These are all kinds, unless they are internal personnel, and it is a computer administrator, otherwise it is impossible to change what account, how much money is turned inside, and so on. I am a hacker is interested. I still have to go to work every day, I still want to make a fortune. I am like an envious of people. Have you seen the moisturizing of a hacker? No. The best is to go to the security personnel and network administrators.
With the US Navy Server, I decided not to visit him at least one month. It has been 5 o'clock now, you must sleep, even though I am more excited. Hefront, lying down my single bed, I will enter my dreams for a while. It is this good day to stay up late, I don't worry, I haven't slept. Lying in bed for no more than 10 minutes, immediately sleeping and dead pig.
Various dreams. . . . I seem to see Xiao Min laugh at me.
7. War of the Software Development Department and the Network Department (2)
If you go to our unit, please find someone: Who is the most cattle in your unit? Most of you will get the answer: it is a person in the network.
If you continue to ask, except what they are? Most of the answers are: Finance Ministry. gosh. If you ask again, do you have it? The possible answer is: Should it be the Software Development Department?
From here you can see that our Software Development Department is better than that of the financial department of other people's hearts.
In our unit, people include leadership, the part of the network is amazing, because the homepage of their entire day can be seen everywhere. Everyone is in harmony with them all day. Everyone feels that they are so beautiful with the page that uses the ASP. So, the network partner really thought that they were very cattle, and the tail was a bit! Then the financial department of the financial department, they have made a salary inquiry system, everyone must use their things every month. So their name is also very good.
Only our software department, developing things, the most cost-to-brain, but developing things generally in this unit is a small number of people. So, no one knows what we have made, and no one knows what is going on. In addition, the guys in our ministers go to C , go to Java's things. So a general modification registry, network usage skills, but it is ignored. Not these buddies don't understand. Instead, everyone feels too simple, can't remember, I need to check online, I can't remember it.
Every time the person in other departments encounters a computer problem, starting to find someone else of our software development, and most of these buddies are one sentence: Simple, go online to find a stuff to fix it. As a result, in order to find the stuff, it took 1 hour. Finally, finally solved, but it is not as good as the network and the Ministry of Finance, and it will be done in less than 10 minutes. They all made these things all day, so they were more familiar, and they were remembered in their brains.
Our people, each time they complain why they don't ask, how does the API function intercepts, how do VXD written? inverted. Ha ha.
After a few times, the people of our software department have low in other departments, and after the problem, it is almost the network department and the financial department.
In fact, these we don't care. I didn't want to waste time on these issues. Moreover, everyone has their own strengths, they will engage in web pages, engage in registration, and is also a good thing. nothing to say. However, there are several kids in the network, always call us, give us small shoes. In this case, our people have opinions, tigers don't have it, do you really think that we are a sick cat? Do you really think that we are not as good as you? Humph!
The software department may be the largest in the entire unit. Everyone is often written, while Down. Yes, there is also a private place. And Down's things are very big, such as Visual Studio 7cd, such as MSDN 2CD, such as Delphi pull. and many more. Anyway is all big. Our only MM is no exception. She is primarily a document. Write procedures are relatively different. But her down is not less than us. For example, the popular garden 2, such as what is blue life and death. and many more.
Everyone is busy with their own things. There is no movement in your small office. It is estimated that it is busy with your own business. Everyone is looking into themselves. I am also on Down RedHat 9.0, 3 CD. At the same time, I listened to the "middle school era", pure feeling, really good. I like this pure music. Next to the buddy, I will sing the "nunchaku" of Jay Chou in Chongqing. Every time I have a feeling of jumping, I will shout: sing again? Sing again, sing, I will sing you with a purple light! Haha! The buddies sang the last few words and dropped his table. Other buddies laugh. The MM of our department will turn on me.
It is hot with purple light, this sentence is here.
All of us, everyone has a laptop, mainly to bring convenient to the development program. Our devices are all bought by the equipment department. That helper, I don't know because of patriotism, or because of cheap, it is uniformly bought. The largest problem of purple light is a large amount of heat. At that time, the mm of our department just came later. It is also in the summer, the machine opened a morning is put it on the table. I didn't have it when I was eating, I came back, everyone gathered together. If you want MM, you may think about listening to us, let's knock some documents, anyway, she took the violet, and took them directly on her thigh. Just listen, "ah" screams, MM jumped up, and the purple light fell. You think, summer, people MM wear a stockings, a skirt, at that time, the notebook put her stockings. I don't know if the purple light is really hot, or the MM is particularly sensitive. Anyway, she jumped at the time. I scared us a few buddies, everyone didn't know what happened, only listened to MM to touch her legs, saying hot. Everyone understands. At that time, several buddies laughed. Help MM pick up violet light, it is ok, it is still bad. Since then, violamoes are famous here. I use violet to death, and I have become the most creative threats of people here. Every time you use it, everyone laughs.
"Hey, the network does not pass" our MM shouts. Our mm called Li Yuanyuan, and it took advantage of it. Other buddies are all coveted with her. But it seems that our Lee MM is all white-eyed.
"Really, TMD Network" suddenly complained to start this day.
I saw it, I really, the window of the flash Get has no green speed line. Head, it is also from the office. Q: "Is there any network?" Seeing everyone's complaint, the head immediately went back. We see that he is dialing. After a while, he came out: "The network said that the switch to connect our department has faults, and we blame our data amount too much. They will fix it as soon as possible."
This is already the fourth time this week, and it will come here every day. Everyone hates the teeth.
Rely, will not be faulty every day? "
I really don't understand, where is the amount of data, the switch will fail? "
Yes, the maximum is slower? Where can I break? "
Everyone started seven mouth.
I know that everyone is correct. How can a switch that might be so easy. Even if you come out, you will not be so easy after you change it. I use me.
Write the program and gateway to establish a connection. Discover the connection establishment success. But it is broken immediately, this time is very fast. For other programs, you can't see it, and the network is not the same. I immediately understood that some people were in the network. Obviously, the gateway in our department has been moved. It is also said that the switch is faulty. Is it really bullying we have not played a network? I analyzed the reason, it can be determined that it is limited to filtering or rules on the router mouth to connect to our department. Obvious people are faulty.
The lesson is time, otherwise they are so happy, doing things are not good. I am most annoying is that when I get down, the network is broken. In fact, I am very familiar with the network of our unit. All I have 100% grasp. Our unit is used by Huawei router, R262x series. Oh, those people in the network don't know. As early as a few months ago, I have compiled the operating system of Huawei router. In fact, the router's operating system is relatively simple, more simple than Linux. Therefore, when our unit just bought this router, a brother of the equipment department made me help them accept it. I took a chance to borrow a home. On the evening, I gave him a buddy where, then Both buddies are a teaching assistant of our famous university electronics engineering. Get the router to their laboratory, use that logic analysis instrument, and then with the ROM reader, basically put some of his operating system's main things on my disk. Although these things are not a complete operating system. But the code of the cruiser should be almost almost.
After giving home, I will read the last paragraph when I don't matter. I have an amazing discovery soon. It turns out that Huawei router has a privileged password! That is, if you want to enter the privilege, you must enter the correct password. Otherwise, it cannot be entered. Like the computer's BIOS, it may be convenient for their engineers' maintenance. His actually left an universal password. I completely understand why his manual said: in case you speak the password, please contact Huawei dealer. It seems that their engineers know this password. And the universal password of each router is not the same. Otherwise, once the leak, the Huawei router don't want to sell. Even if some universal passwords are leaked, there is nothing, do you know which corner of the router in China?
This amazing discovery is really excited for a long time. This time I didn't seem to be bad. Because I declapted the tensile router of the universal password just installed the total exit router of the entire unit. Haha, you think about it, I have said that I have a Class C address who can change. Haha, it is because of the credit of this router.
Now I just need to enter this router, so this is this, I see that your network is also given to our hob! ?
Thinking of this, my face overflows the revenge acknowledgment. . . . . .
8. Software Development Department and the War of the Network (3)
Although I have 100% of the grasp, I want to get the control of the router connecting to our ministry or a matter of time. And the gods that must be doing are not known. After all, it is all of myself, the internal contradictions, and everyone will open a joke. It's not good to openly. In fact, the network partner is also good. Some network issues are often discussed together. They have seen things, so I often ask them some problems. But their head, surname Hu, Long and "Kaijiang Scout", the sly, the sly, thin, wearing a glasses. And our head often go to dry at the middle cadres, because our head is a Ph.D. That Hu captain (the people in our software call him) is not, and it is a student chemistry, because amateur hobbies the computer, it is also good, that is, the master in the hearts of other departments. Since I used Flash, I had a promotional material in our unit, and the upper person was very happy. At that time, there was no software department, and the unit construction network department did not have any other candidates, so the "master" will have the leader of the network. Of course, these me also listen to other foreigners. I also came later.
Of course, our head is later, otherwise, it is impossible to take him. Every time the Hu captain presents them to get the website, and it is not a time. Our head always uses some unable to defecate the truth to reject them. Don't come to Taiwan every Hu captain. You think, China's officialdom is struggling, everyone should have a few people. So, he hates our head, and even the part of our software is hate, this is good to understand. With him the theoretical level, I want to make a rich in the world with our head. Hu captain gave up with us to grow up. Although he can't do other respects, he is confirmed by the network, which is not blowing. Get someone on the router or firewall. Still not a small dish? Don't need other people at all. I asked my buddies in the network. They said that the password of the router only had their heads, and the router is all of their heads. It seems that Hu captain must have a yin. In fact, these we have, I want to know. Ph.D. The level is definitely higher than you, I can't afford it. Our head is the direction of the main attack is network encryption. The study of encryption algorithm is not unknown. I have taught him a lot of co-reliance algorithms. It's amazing, I see blood, let me understand a lot. More than some shit books. To be honest, I doubt that he didn't understand himself, I copied it.
But our head is not to say. It is not stopping calling to the network, or calling the head of the head.
But now my machine can't go online, more tricks, and no use. Go to the finance department next door, easy to expose. That gang doesn't understand the programming, but you should look out, what you do again. Moreover, making a hacker, or the machine is used up.
Take him, first think of the way to talk about it. The Finance Department and our software department are connected to the same switch. This switch is connected to the same router. The network work is working fine. Explain that all IPs of the software department are definitely filtered. The machines of the network are directly connected to the total exit router via a switch. Because Hu captain made IP and network card binding to all units, IP could no way, otherwise, the IP of the Financial Ministry can be online.
Ping's computer in the finance department. If you don't afford it, it is really a pass. Obviously not the problem of switches. To go online, I have to find a computer in the finance department to help me. Oh, of course, the information of the finance department releases Server. Speed block, quantity and foot. Ha ha.
Don't break your password, because I have already in the back door before they install patch. But I didn't make anything, just leave a back door. Never used it, I don't think it means. But now you have to use it.
Everyone may say that your financial security is too delicious, how do your financial security guarantees? Oh, their dishes are affirmative. However, this Server does not have our department's financial database. Their databases are uniformly distributed from software to hardware from software to hardware in another separate computer. This server is the release of information. Specifically, it is to engage in wage inquiries. The salary data per month is used to use Access database COPY, so there is nothing value. Even if you attack, there is no impact on finance.
Very easy to enter That SERVER. First look at the installation route and remote access? Look, no! It seems to install a proxy server. I passed a proxy , and this thing is small. Everything goes well, soon my machine can go online. Because everyone is an internal network,
100M
Specifications, so the speed and direct access have no difference.
First, we must obtain the password of our router. Then everything is OK.
I originally attacked the computer of the Hu captain. The IP of Hu captain knows. But I swept the computer of Hu captan, and his 2000 professional version of the patch added. And there is no SERVER. So I am very troublesome. needs time. But now I don't have time, you must speed up the speed. Moreover, he affirmed the firewall. Maybe I will find that the SERVER of the Finance Department will scan him. So, I have to be fast. After all, Hu captain is absolutely "master" level on the network configuration and protection level. Impermanence. First, a software router is installed on the Financial Server. Then enter our total router, add a rule in the routing table, forward the data of the Hu captress to the software router of the Finance, and then via the Router of the Finance to the outlet router. Then I installed my own bag filtering software on the router of the Finance. In this way, Hu captain's external packets will be recorded, and he logs in the router is usually used. This is not encrypted. Oh, can your password still run?
In order to save time, you must let the Hu captain will send a password soon, so I all dial the call.
"Hello, Director Hu? Our Software Department. Just now our network has been 3 minutes, but now there is no, trouble, do you check it?"
Put down the phone, I started my package filtering software. Sure enough, very fast, Hu captager's IP packet begins to come back.
Oh, you almost laughed. You think, obviously he just filtered out of us. But I am told that we have been 3 minutes, which is impossible. Does he are still unclear? So I will definitely log in to the router and check the settings. Of course, no problem is definitely no problem. For a while, he may notice. Ha ha.
Sure enough, he didn't have a packet. I immediately recorded the file with the fastest speed DOWN. And restore the settings on the exit router, and then remove all the things I installed on the Financial Server. Then break away. I started to analyze me to intercept the packet on my machine. Because I have a test analysis of Telnet's data package. So the location of the password is now analyzed in the messy packet. by! The password is actually ~ i * hate & doctor% zhang. Haha, Doctor Zhang is our head. It seems that this guy really hates our head, even the password does not forget to remind. However, this guy's password is a bit difficult if it is decipherous.
Ok, immediately enter that router and open the firewall setting rule. Sure enough, this bastard has dropped all the DROP of the address of our software department. After I deleted it, I immediately quit, the network immediately. Who is with Li MM, cheering: "Tong, the Internet", our FlashGet has started a green line. Everyone cheered a few times and started to make myself.
I am thinking, do you want to change the privilegemony, let Hu captain go to the dealer. Later I thought, bad. The joke is big. I gave up.
After a while, Hu captain came over. We played with him, everyone said that will not be broken in the future? Hu captain smiled unnatural. The eyes go not to see our screen. It seems that this guy will certainly find someone to change the router, it seems to come to reconnaissance. I am secret in my heart. But the surface is not moving, and the Java program is edited.
After the Hu captler turned a circle, there was no harvest. out.
I estimate how the people who are unlikely to enter the router with his knowledge depth. As for the decomposed universal password, he cannot understand. I think his only explanation may be that his password is guess by others. Sure enough, after he left, I re-tried to enter the router and failed. Obviously, his password has changed. The head leader is not a fool. The quality of the general network administrator is definitely there.
"Shit" I thought in my heart, and after he re-changed the settings, I had to get the way to get the router channel, talented. How can I get his password for all, I am thinking. I heard the head called me: "Xiao Wang, come in"
I am shocked in my heart. Is it the guilty of Hu King knowing me, tell me?
I am uneasy into the head of the head.
9. Software Development Department and the War of the Network (4)
Enter the head office and found that he was writing his own things on the table, as if it was a paper.
My heart is put down, and the general head should criticize me, usually I will focus on me. Now he actually didn't lift it.
"I called the phone, I called us to send a decrypted master, I don't have time now, you will go for me."
"What are you doing? I am not a decryption. Is this not your old Bank? My program is not yet?" I have to engage in the router of Hu captain, I want to go.
"It doesn't matter, the workload is calculated, the work of the hand is put down, this is the person who wants to personally." Head, looked up and looked at me and continued: "It is estimated that it is also a piece of chicken fry, probably machine If you have a virus infection, you go to play. "
Heaven, the minister personally wants people, this can not be pushed. Our head is indeed a practical person, and even the minister personally sides, he doesn't want to express it, and I have it. I think, these things are not the things of the network, how do you call the part of our software department?
The headquarters of the office is TMD style, and the feeling of going in is like a star hotel. I directly go to the designated office. I saw Hu capture actually, and there is a computer, a computer, a computer, compared to a cattle. In addition to the minister, the minister actually held a policeman, which is exactly a very young, estimated 22 female police officers. The police uniform made me feel very confused. Who is our unit?
"Is the software department? How did Zhang Dr. Zhang?" Minister said.
"I am a director called me to replace him, he has something, I can't come." I quickly explained the minister.
The minister did not say anything, start greeting me to sit down, and then speaking.
"This time, this is, mainly our friendly units need our help. This is the Xiaolin police officer of the Municipal Criminal Police Brigade. Their case is designed to computer. It takes everyone to help. Everyone is all relevant departments. Excellent talents, and then help the police, fight crime, and every citizen's obligation, please try our best to help Lin police officers ... Let's ask Lin police officers and you. " The people who made the officials talked about this, I know what is going on, and the heart is immediately relaxing. Oh, see what is going on. I didn't expect to contact the police today, and still a case. Oh, fun.
The Minister and the Lin policeman have played a few hahaha, leaving the office. Now we have four people in the house.
I was obliquely opposite Xiaolin police officer, and the minister left, huh, huh, no pressure. I started to take her. Wow, now the new uniform of the female police is really good. Very spiritual. And this Lin mm, how to describe it, should be said to be "handsome". The round face, big eyes, white skin, short hair, is usually what we say "乖". And the two small metades are also cute.
The minister left, there were three big men left, all waiting for her to talk, Xiaolin is a bit unnatural. Look out, she should also just do this soon. After a while, she started to introduce us to us.
It turned out that in all cases, there was a suspect that he had never been explained. And they have no other evidence, only one computer file being added. The police suspect that this document is evidence. So I want to unlock, but this file is a unknown software that is not known from where Down. The decryption program cannot be found online. Their people have worked hard and there is no way to unlock. So I have to ask us to help. Because our computer application level is here, although I know that this is the result of "propaganda", it is the result of "bragging". However, they are anyway to use organization relationships, find the door. I didn't say a word. Occasionally look at Lin MM, and then look at Hu captain. This is not talking to me. I don't want to talk. Ha ha.
"Will it be a Word file with a password? If so, I can solve" Hu captager finally spoke.
I almost laughed out, relying on, if it is Word, the prescribed police team is so happy to move? Is it not said to be said, it is a unknown program that is unknown by foreign DOWN.
"Not, it is a foreign download called Filelock program." Lin MM seems to be a hipster. From her eyes, I saw a piece of disappointment. Probably she didn't expect our computer master to ask such a line of travel.
"You can search online, usually there will be a decryption program." Hu captain continued.
"But we didn't find it." She stopped, supplement: "This software is very unknown, so we have no way to contact the author, and online generally rarely use this software, so the rules should not be "
I imagined, the criminal police team has suffered a lot of hard work.
"We used this program to reverse engineering, but this program seems to be completed, we can't read his procedure, tracking the tracking." Lin MM now seems to be confident, and it is impossible to see that our Hu is nothing. Bar.
The buddy of the Finance Office did not say, I estimate that he didn't even have it, he didn't dare to speak. Oh, I don't want to talk, I want to see a few brushes in the end. Ha ha.
Hu captain also saw it, this Lin police officer is not a line. Maybe it is the computer master of their police team. No one is more stupid. It is not used by the inquiry, and the empty call is not used. He is familiar with the network configuration, but decrypts encryption, I dare to say that he is a line. Because encrypted decryption technology, it is generally not difficult to learn through the system. Hu captain went home with a chemical halfway. I have been engaged in the network all day. While time to study these. So he is absolutely not too late. As for the buddy of the Finance Department, this is nothing to do with the registration. So, I doubt that he didn't understand it. Ha ha.
"That's no way, who knows that he uses a deceased? Tibetan is easy, find something difficult." Hu captager began to fight the game.
"Yeah" Lin MM is laughing. Some disappointed. Then routine formula: "Is there a good way to have two other comrades?" Her eyes swept us.
The buddy smile "There is no way, this is really difficult".
Lin MM stopped on my face and asked forget me. I have already started to clean up the notebook in my hand. It is ready to go.
"Can you provide that FileLock software?" I opened it.
I saw Lin MM's eyes on the eyes, I can answer "can, of course. We have this software, you can't analyze it. Can you help us analyze?"
"Oh, I don't know very well, it is far more than your criminal police. However, you can help you see it, it is difficult to say. Haha." The Hu captager is here, what can't be said, otherwise, our network days are not good, wait for me to get your router password, huh, I am not afraid of you.
Lin MM has a smile on his face. In fact, she is also a young man. Just just work, deliberately do more serious. Now, I said this, she also relaxed. "To the right, let our little king touch, maybe it can come out" Hu captain deliberately said that it is very heavy.
I am smirking.
Everyone laughed and walked out of the office.
I saw a bad face on the face of Hu, even though he was laughing. I think the network of our department is definitely a problem. Making his password must hurry.
I slowly walked out of the headquarters. Considering how to engage in the password of Hu captain.
Just out of the door, I heard someone shouted: "Hey ~~"
Let me look, a white Santana police car, inside a female police called me. Isn't that a small forest police officer?
"Call me? I am not surnamed, my surname." I walked over, "You haven't gone yet?"
"Oh, I know. Is this not waiting for you? Where are you, I will send you," Lin MM is a little smile. "
"I will live in the north, not far, 3 stops" I generously opened the door, sitting in front, next to her. "Go".
The police car was started. There are more Santana in this life, but wearing a police lamp is really ahead. It feels a bit weird. The car is started.
"You help us decipher the program, what conditions and tools you need. We can try it as much as possible. She still did not forget her work.
"What professional are you learning? Is it a criminal investigation?" I asked.
She stunned, then said: "Do you guess?"
"I think you are absolutely learning computer."
"why?"
"Not what is, I think it is. Do you say right?" This is not a mess. The people who learn the computer have encountered together, a few words may feel. Really.
She laughed, did not speak. I think I guess it.
She now speaks more. "Can you decipher this program?" Two people who engaged in computer, don't need to say nonsense.
"You tracked that program, how do you feel?"
"It's a bit difficult, he did it, and there was anti-dynamic tracking. I have been following a few weeks, I can't keep up."
"Does see his password algorithm?"
"Oh, there is no."
"In fact, dynamic back tracking these, it is also good to do. I am afraid that I will follow up, the encryption calculation method is the general algorithm in the world. This is troublesome. Can not decipherse, basically look luck." Probably What is said is indeed a comparative, now she is completely believed. And began to pin it on me.
"You must help, this case is more important to us."
"This takes time, I will try it slowly."
I quickly arrived in front of my dormitory, I got off.
"I am very glad to meet you, my name is Lin Ziyan. What is your name, can you give an email or qq? I sent the program to you?"
I told her my name and my phone and Email and QQ. The guest venture says: "Do you want to sit?"
"Next, Bye" Her car has been opened.
10. Software Development Department and the War of the Network (5)
When I was internet access at night, I found that someone has requested it to add a friend. Oh, look at it, the net name is like smoke. Maybe Lin police officials. After agreed to add as a friend, ask, it is her.
She can't wait to send the FileLock program.
I received it. The program is small, 100K is not arriving, only one simple window interface. When I chatted with her, I told the Softice to start tracking. Oh, don't dare to say, but tracking procedures, decrypting encryption is also my strength.
In fact, our national encrypted golden era should be when using a DOS operating system. At that time, I can say that encrypted decryption is the synonym of the master. That era, countless masters invested in this encrypted decryption battlefield. At that time, no matter whether encryption or decryption, I thought it was really called. Now Windows, the program is big. The trace program is more difficult, and the idea of anti-theft has developed from the technical level to the legal level, so encrypting decryption is weakened. Plus the popularity of the network, the masters have almost turned their attention to the attack of the network program. My encrypted solution is the practice of that era. At that time, the keyboard of the KV300 was decrypted, it was my entry course, Debug is my favorite. Later, master's degree, my topic is to discuss the technology discussion. The universal decryption technology proposed at the time was also the first in China. My mentor is not admired.
However, tracers are still very difficult. Don't believe some people brag, say that I read a few hundred k programs one night. Also crack. It is definitely bragging.
After I followed a paragraph, I was still very smooth, but I was so deadlocked. It seems that this guy uses anti-dynamic tracking technology. I have an end in my heart. For this procedure, it is not a normal program, you must slowly come. Since this guy writes the encryption program, this guy is absolutely nor a rookie. Those tricks of decryption, he will not know? Inverse tracking, first of all is the backstocking assembly. This technology is necessary for the encrypted. It is the program that makes you disassembled. You can't read it. However, in theory, the program can be deciphered, because no matter how you transform, you must have a computer to implement correctly. But let you read, the computer can be executed, which is easy. For example, add a 1000 meaningless loop. The computer can perform. But can you read it? You don't do it, because the following code must be decrypted by this 1000 loops. You are dynamic, he adds some anti-tracking measures, such as whether there is a debugger in memory, if there is, immediately refuse to execute. Even let your debug crash. Even more than the time to see if it is tracked, if you track, your time is sure, and perform it directly, you will definitely have more short. At that time, the experts, I worshiped the idol, now almost all the people of the IT world. And the following procedures are re-executed, perform a segment, decrypt one. Basically, you can only see a small clear text in memory, all ciphertext. To deal with the game, it is really difficult!
I followed the program. His encryption method is relatively simple, which is the method of repeated transformation. The first is to pull yourself multiple transformations, that is, what we said. And he is not using what ARJ now, what ZIP is added. It is an algorithm to add a whole. This program uses a 3-clock change method and adds 3 layers. These mornings are in my expectations, so I will soon take off his three shells. Now there is any original assembly code. But things did not finish, he adopted implicit calls. That is, when the programs are called, they are not using instructions such as Call or JMP. However, it is desperate to press the data to press the data, pop up the data, most of which is meaningless data, it is paralyzed you. When you have a head of Sun Wukong, he presses the correct address and transfer it with the RET instruction. You can't see a call and a jump instruction.
I saw his code and there was a code of Softice. Just use Softice's tracking, it will crash. Oh, his trick is older, so I have prepared it. My Softice has been transformed. He found that he could not deal with his transformation tricks, because you can track it, so what implicitly called, what plus the case, all lose the role. Ha ha. I will send a message to the police officer; "When did you follow when it is?"
"It is the critical code segment of the shell, my Softice is dead."
Oh, it seems that her Softice has not been transformed. Of course, the dead machine, each decrypted key code has an anti-Softice code. And you can't skip, skip, you can't decrypt it. Of course, you will die.
"Where are you tracking?" Lin MM asked.
"I? Oh, the shell is complete."
"Really? Why don't you crash, what do you use?"
"Of course, Softice, what else?"
"Ah, how do you skip his anti-tracking means?"
"I have been with it, I didn't crash." I deliberately put it. Oh, I am afraid that she asked me that program. It's not good to postpone. The real hacker will not easily give your own tools. Moreover, the other party is still a policeman.
"Oh, you lie to me." Lin MM of course knows what happened. I didn't continue to ask.
"How long have you doing a policeman?", I continued to track the program that had taken off the shell, trying to find the code of the decryption file.
"More than a year". She replied, "Do you think it is a despite hope?" She always cares about her work.
"Do you graduate from your school", I am bored. At the same time, I use that software and encrypt a file. Then use this software to open her, enter the password, try to find the process of checking the password.
"You check the time, I want to check the account. I can help", I followed a playful smile emoticon.
Oh, I got back the symbol of a red face.
At this time I found the password transformation code break of the FileLock program. At the same time, the location of the password in the file is also found. Of course, it is encrypted.
Just read this password transform code, if it is not difficult to algorithm, it will basically solve it. I am happy in my heart.
"I found password transformation entry". I sent a message to Lin MM.
"Great. Really?" I can almost feel her excitement. She is understanding, knowing that the password transform entry is almost successful.
"Don't be happy too early, look at her password transform algorithm. God Bless You. I have to pour cold water. In fact, to tell the truth, for this procedure, it can track the password transform section for a few hours, which has been greatly unexpected. It can be seen that this program itself is not very strict, after all, it is just an encrypted program on the Internet. It is not a business program, and it is said that it is a test program that started a beginner encryption.
I have been preparing for all overnight battles. It seems that it seems very smooth.
I poured a glass of water and started slowly drinking, while I started to read the password transform program code. According to my experience, it is really tested for perseverance, because this is a password transformation, you must read each sentence. Unlike dynamic tracking, you can run automatic operation in large sections. Only you understand this encryption process, you can turn the password in the file into a clear text through the inverse process. The password transformation used is usually very complicated in order to be deciphered by others. When writing, the author generally does not use standard way to write, simply, how do you read it, how to write procedures. Anyway, let you read it.
Anyone who reads the procedure of others generally knows that the procedure of reading others is not as good as you write. Now I am reading the procedure that others deliberately let you read, and the difficultness is imagined. "Can you send me the password transformation program?" Lin MM sent a message.
"Of course". I sent him a screen copy of the code.
I started to read the program. After reading more than half. My heart began to sink.
I am very familiar with this code algorithm, and it is far without what I imagine.
But because of this, I feel lost. I know, I want to decrypt this program, I am far away, I am so optimistic.
The guy written in this program, elsewhere is the own algorithm. His knowledge is obviously not high, so it is necessary to decide the algorithm he created. It is really difficult to say that I am not very difficult. His three layers of shells are not clean after a few hours? The key is this most critical password transform, he does not use his own algorithm.
One of the algorithms he uses I am very familiar. But it is because I am very familiar, so I know that the trouble really begins to come.
I sent a long sigh to give Lin.
"The possibility of decipherment is not large, look at our luck."
"This algorithm is familiar ..." It seems that he is still in the quagmire of reading code.
Tonight, I decided to give up. because I know. Don't give up, there will be no progress.
11. War of the Software Development Department and the Network (6)
"It seems that there is a hard process. Do you have enough patience?" I sent a message to Lin police officer.
"Ah, why?" Took a crying face.
"His password calculation is the DES algorithm."
"....." has not responded for a long time. After a long time, I came back. "I can't think so familiar. ~~~, trouble."
This person writes FileLock, it seems to be a line, and more professional, his password algorithm is actually used by a popular password algorithm. But this public knows the algorithm, basically unsearable.
Anyone who has been encrypted, I don't know this algorithm. This algorithm is also visible everywhere in textbooks. The DES algorithm was promulgated in 1977. It's almost 30 years now. But it is still useful everywhere. It can be seen that the security and encryption strength of this algorithm are worthy of praise. He uses 56-bit encryption. For ordinary people, decipherment is almost very difficult.
It is necessary to say that the readers who do not understand the plus algorithm are said. In fact, the world's true encryption algorithm is basically public, except for some special places (such as military). That is, the algorithm everyone knows. However, these algorithms one of the most basic features is irreversible! In other words, I know that you know the text, and this algorithm, anyone can calculate the ciphertext you password. But knowing ciphertext, is unable to launch your plain text. That is to say, even if you know the algorithm, you don't know the password, you can't retrore. This is the wisdom of humanity, this is the charm of mathematics. I don't admire. Why is this, according to my current mathematical knowledge, it is just a known half solution. But I know that these are proven by mathematicians. If you want to rebuild your password, it is ridiculous. If you have been pushed, you are basically a mathematician.
Of course, the only way is exhausted. That is, you have a password a one, calculate it, whether it is the same as the secret, if the same is the correct password. But on the network, if you give you a number of times. You can say that there is no way. Fortunately, it is now on standing. Fortunately, I have figured out his algorithm. Fortunately, I can solve his number of times.
Therefore, it is not completely desperate. But whether it is successful, you will see the strength of the password entered by the encrypse. That is to watch luck. Since the computer speed is now getting faster and faster, many poor elements cannot succeed, and now there is also possible. So now there is a longer password algorithm to replace DES, such as the IBM's MARS algorithm is one of them. If you encounter these algorithms, I will definitely give up immediately.
"What should I do now?" Xiaolin MM is obviously a bit anxious. I think she is sure that she has solved it, and now I am actually encountered such a powerful obstacle.
I found that a woman is a woman, don't look at Xiaolin wear a very prestigious look, but now, it is clearly reflected in the side of the woman's weakness. In fact, the police are also people, they have a strong housing, but the heart is still the same as ordinary people. Ha ha. The best match between two computer masters should be a man and a woman, because men generally don't jealousy women, and women feel that men feel natural than her own. So, this is nothing to do so, and I like this, I like this. I most hate my fake.
"What is the computer level of the encrypted file?" I sent him a message.
"According to our information, he is learning financial management, using a computer, but it should not be a professional."
I have a number in my heart. This guy knows how to go abroad to Down encryption software, indicating that his computer knows still a certain basis. But after all, it is not a professional computer. Generally speaking, the depth should be limited.
"You have analyzed his computer, such as his Email password, his password on the online regular place, such as his length of Windows password, and the characteristics is not analyzed." I sent a message to the past.
"Of course, the password he is in the evening is generally characters and numbers, and the length is generally 6. His WINDOW's password is only 5."
I understand that it seems that this encrypted person is not particularly concerned about cyber security. Otherwise, his password will not be set short. In this case, it should not be completely no hope for his password.
"OK, wait for me to write a program, you find a good computer to run a run, maybe you can run the password."
"Well, when will the program give me?", This forest mm is definitely an acute child in this area. Ha ha.
"When I will get off work tomorrow."
"OK, tomorrow, I will come to you."
"Your police make things, good fake?" I started to tease her.
"How do I fake?" She responded very quickly.
"Not saying you, I just saw a bank's anti-robbery exercise on TV, a robber and security guards were not afraid, and no matter the death of the hostages, they went directly, play the group, directly The gangsters are pressed. Haha, if they are really gangsters, are they not afraid of death?, Even if there is, this is stupid? ".
"Oh" see what I said is not her, she may be relaxed.
"The exercise is like this, do you want everyone to really use the live, really kill people." She began explaining.
"In this case, there is no need to perform on TV, this is the image of your police."
"Oh" she didn't explain again. Say "I want to sleep, bye". After a while, she disappeared from QQ.
I haven't slept yet, I am hot, and I write that decrypted program. Using standard C syntax, use the character interface, this program does not require interface friendship. Then the password strategy I am set, 6, 5, 4, then 7, 8 bits, 12 bits, then 3 bits, then continue 13-. In this way, according to the characteristics of the encrypted person, it should be large. I have written many times before this program, so I changed some of the previous procedures, and OK. Save to my FTP. At that time, Down gives her, let her use a computer, and my mission is completed. It is not enough to see how many passwords added by the encrypted person. I am not a god. I can't solve it.
It's almost 2 o'clock when I sleep. I often sleep so late. In the dream, I actually dream of I got the password of the Router of Hu captain, and Hu Chenjun as long as I changed, I immediately knew it. How do you know, don't know, dream is not reasonable, isn't it? Ha ha.
Hu captain, you are coming. I don't want to get you, I am not willing.
12. Software Development Department and the War of the Network (7)
John Doo's getting up, hurried to work.
Just arrived in the office, the head called me in.
"The headquarters called, I want you to help the police have done things well, don't lose our face. The work in the hand can be put down." Head smiled and looked at me. I estimate that he also knows what thing.
"What is the problem, there is still a police?" It seems that he doesn't know the details.
"In fact, there is nothing, it is to solve a DES password." And the inner line is simple. I will understand it.
"Solve DES, this East, Hu captager knows a fart. How is it? How much is it? Our machine speed may be too slow."
"Yes, I don't care, write a procedure to let them find the machine to decompose. Don't do it, look at luck."
"Oh, now the speed of the machine, DES should be a problem later." Head is indeed inner line.
"Okay, your current task is to give the criminal police to solve this problem." Head finished his papers and went.
From the head office, everyone is complaining that today's network speed is slow. I opened the flash Get, but I didn't, I used to download the speed of more than 100 KK. Now I am not 10K, and I can't feel it. However, we download the software feels very obvious. I suspect that it is also the Hu Director in the ghost. However, the network is slow and normal. So I dare not determine. Run to the finance department next door, saying that it is a bit slower when the network speed is? The financial office said, fast, faster than yesterday. I personally download the same software, and it is 120K. Soon, relying on, Hu captain strikes to be poisonous. Let you browse the web, but download is slow. We slowly so much, no wonder the financial office said that it is faster than yesterday.
It seems that you can't let go of Hu captain, don't get his password, our network seems to be never yet.
To get the password of Hu captan, you must have to attack his computer so that you can install the back door software, no matter how his router password is transformed, but flee my master. But this guy is not a rookie. His personal computer protection is very good, did not open any service, and the empty connection was banned. I want to attack directly from the Internet, obviously unlikely.
What should I do, I am thinking. Suddenly I saw a female police entered our office.
After the female police asked Li MM sitting at the door, I came to my desk. Other buddies include Li MM standing up. Everyone is so stupid to see this female police step by step to go to us before.
Everyone is confused with each other, and there is a buddy, I can't help but. Just asked Li MM: "Xiao Wang, what is it pulled?" Li MM shook his head, although he was deliberately lowered, but I still heard. Rely, this black pot can be made back.
"Dear, this is the police officer, looking for me to help them write the program." I said loudly. I finished, everyone "cut", haha, laughing, then shrinks to his desk.
Xiaolin police officer heard that I said that I would like to see it, she tried to turn to everyone, but she didn't see it when she turned back. Her mouth is moving, smiling, swallowing the words.
"Oh, isn't it said that after get off work in the afternoon, how can I come so early." I hurriedly greet her.
"Don't wait for the case, the sooner, the better. We have already greeted you, your current work is to help us." Xiaolin said with a smile, now she obviously speaking me casually. If it is completely suspicuous at the last time, then it is basically the attitude of trust.
The face of the criminal police team is big, it is no wonder that I just said to me. No wonder, she now comes directly to me. It seems that the relationship between them and our ministers is not general.
The minister has spoke, what else does I say? This work is relaxed, it is a good difference. Ha ha.
"Your program is not written?"
"OK, I will give you now?" My hand touched the computer keyboard to start tapping.
"No, or you will take me with me"
Halo, when I am a prison, I will take a look at you. I almost laugh.
Seeing that I am laughing with a smile. Lin police officer immediately understood. Don't mean it.
"Sorry, professional habits. I mean you with me to our computer room to install debugging, save trouble. Ok?"
The minister said, what can I say, go out to see the machine room of their criminal police, I also want to be curious. The people of the criminal police team wearing a police uniforms, and they are really very good. Ha ha.
Let's go, don't talk. I am going fast, surpassing her little, she is anxious.
When the door was out, the guard actually looked at me. It is exactly to look at us. I actually didn't ask me to enter the certificate. To know that the SARS period, our access is that the ministers are going to be certified. What's more?
But today, the guy did not ask me, he saw a policeman followed, of course he also saw the police car outside the door.
When I saw a police car, I got the eyes of the door to see the eyes, I immediately understood it, and the grandson really thought that I made something, this police is to catch me?
by! I licked your eye, I invited me to the police. I almost laughed out. Haha.
I got a car, I said the first sentence is: "When you come to me, don't you wear police?"
Xiaolin MM stunned for about 10 seconds, then laughed. Laugh on the steering wheel.
I first saw that Xiaolin police officer was so laugh, I feel that this is a girl, I feel that she is not a policeman. I am so happy to see her laugh, I also laughed. She laughs more and more.
On the way to the Public Security Bureau, Xiaolin MM will look at me again. I am deliberately, she looked at the front of it.
The Availability of the Office Building of the Public Security Bureau is a passish. I used to see it outside, I have no friends of the Public Security Bureau, so I have never come in. Now come in, see all the police uniform. Just a casual. It's really not yours. I got on the elevator and I went directly.
The elevator is two people, or I am orphan, I am more uncomfortable.
The scribbled words "" You live so high, really happiness ".
She laughed. Why didn't I find out how this Lin police officer smirk. Is it a particularly funny person?
I have come to their office soon. Seeing a university 30 years old, it looks like a police, like a university teacher. Warm and greet us.
"This is our kind introduction of the enthusiasm of Xiaolin police officers.
"This is a master of a certain computer, Xiao Wang" she deliberately said that the two words of the master when I introduced me.
I glanced at her, she laughed.
I quickly shake hands with Li Kemist.
Li Kezi is very enthusiastic.
"Xiaolin, you take Xiao Wang to our computer room to decrypt. Need any equipment, you tune it. We fully support."
Then we came out, I saw the signature of the office: Information Safety.
I am most afraid of dealing with people. Although the people of Man Li look very well, and it feels more embarrassed. But I am not comfortable.
On the corridor, I am free.
"Hey, I don't have to introduce me in the future." I am innocent.
"Oh, what are you introducing you? Are you not a computer master?" Xiaolin was spent.
"I am not anything. I am Xiao Wang .ok?"
Xiaolin still laughs.
"You are Li Ke, it looks like a police." I started to transfer the topic.
"Oh, he is the highest credit of our public security bureau, a doctor of a certain university.
Day, there is a fight with our head. It seems that the Public Security Bureau still has talent. I spit tongue.
To be honest, the Public Security Bureau in my heart may be in many people. It is considered that they are all "crude people". Most of them are team military people, and the graduates of police schools. So, I didn't expect that I actually encountered a Ph.D. in a famous university. No wonder I think he is not like a police. Because he is not like the police in my heart. However, everything is changing, the country is also changing, the Public Security Bureau is also changing. Later I learned that the Public Security Bureau is also a place to hide the tiger.
Already reached their room. The door is hung 1 information security department's brand, and there is a warning next to: the machine room is heavy, free people are excessive.
Go in and see, see a slippery desktop machine, see an IBM notebook on the table. There is also a skilled person sitting in front of your desk. I have seen it, some people are online, some people are analyzing the program, some people are writing procedures, and some people are debuging viruses. These I am very familiar, I will see it. The person who debug the virus keeps tracking, while displaying the effect.
After Xiaolin entered, some male policemen were only loaded with shirts, and their coats were hanging on the back chair. Everyone hits her. joke. This is normal, the girl is popular in the office. Especially when men and women are seriously imbalanced.
Xiaolin and they laughed after a while, pointed at me whispered: "This is the decryption master I invited to the computer, we are to solve the password of that file."
I glanced at her, but it was late, a few big masters' eyes were flourishing like a knife.
Everyone should know that the peers are the truth of the family. These people are specializing in computer. And it is in the Public Security Bureau. Originally, the bull's choice. Now someone is open to the board, and when you are in the face of MM, can you say that they can be good? Uncomfortable in my heart, can you friendly?
"Oh, don't listen to Lin police officers, I just came to learn. No way, leaders let me learn, don't listen, I am far more than you." I smirked.
Everyone's eyes are good. Everyone started to play haha.
I took the time I won the little forest. But she did not see it. I am looking at other places.
We started working. I quickly took my program down from my network.
"Need a machine to run password" I said.
"What kind of machine?"
"Of course, the faster, the better," I said.
A man-like person thinks about it, saying: "Our Coang has arrived at an IBM's latest server, and has not been put into use. Do you want to use him first?" Xiao Lin said, okay.
One thing IBM machine was hugged.
I look at it, rely on! The Public Security Bureau is really rich, hey, the country's money is not painful. This is a server for IBM's latest XSeries 440. We have never used it. I am just reading photos. Don't look at where the black housings are placed, it is not eye-catching, but the performance is absolutely not said. I am looking at the configuration,, double CPU 2.G, MP,
2G
RAM.
The administrator also asked me if it was used? This is used for database servers.
"It's enough, enough" Halo, this machine is not enough, what is the machine enough.
Pack the machine and look at it, dizzy, actually straighten it yourselfself is a Windows XP Datacenter version. Ok, Window XP operation is almost. So I will not be ugly. In fact, I am also the first time I use the Data Center version of XP. Fortunately, several police brothers who estimate around them are also used. Because they are behind me, don't say a word.
My self-confidence in front of the computer is absolutely.
In fact, for this program, using XP is completely wasted, using Data Center is more wasteful.
But now I don't care so much. I can't give them a new operating system.
I decrypt the console to decrypt the program down in Windows2000, Copy to this IBM. Then Xiaolin took the documents they need to decrypt to Copy.
I open the console, enter my program name, follow the file he want to decrypted as a parameter, a car, the program starts to run. Start flashing a string of numbers on the screen. Hey, it is a level of IBM. You can also see the numbers displayed on the screen when you run on my machine. But now, the screen is a white, it can't see the number displayed, because the display is too fast. It's really fast.
I really had the urge to move this server home.
I love to leave the computer, stand up. The ancients said that the sword sent a hero. I am a computer worker, but I am even more excited than seeing a good computer.
"Okay, let the machine have been driving, don't stop. When I won't flash, it is the day of the password."
I saw that several police brothers had obviously impressed the meaning. Because this program they have been working for a long time and have not succeeded.
The police who just tracked the virus said: "What is the algorithm used by him encryption."
"DES" does not have to be nonsense.
"This program is the anti-tracking means is powerful. I can't walk with it."
I smiled and didn't speak.
And Xiaolin police officer out the door of the machine room. I said: "You are really money, such a good machine is used."
"Oh, this is all superior."
"Nothing, I will go back, wait for the password, inform me, let me also satisfy the vanity."
Xiaolin laughs. Oh, laugh. Then look at the table and say: "No, go to lunch time. I invite you to eat, thank you."
"Don't come here, I am innocent."
"Oh, what is it, just eat a dinner in our cafeteria, not in the restaurant"
"Waiting for the password, I officially invite you." Xiaolin MM said with a smile.
To be honest, I want to leave. But Xiaolin has already pulled me to get went to the food hall. I don't want to find an excuse.
Now Xiaolin and I have already mixed it. She doesn't work with my guests at all.
Hey, look at how the public security bureau is, it is good. I thought, wait back, talk to the bodies, in fact, the public security bureau is not as good as us. Ha ha. 13. Software Development Department and the War of the Network (8)
I swear, next time I kill me. I will not go to the Canatus of the Public Security Bureau to eat. Especially when wearing casual. I still have uniforms? Ha ha.
Anyway, just don't go.
You can imagine a cafeteria to come to the hundred people, gray, black police uniforms. Is it a feeling of being in a casual?
Usually, there is also a casual, I think. But that day, I did not see one, except for the master inside the kitchen. I will wear it alone.
And most of them are a male policeman. Everyone eats me as a taste. I think.
I and a female policeman faced. The male policeman saw me. The face is a bit hostile. The female policeman crowded with Lin police officer. I don't know what it means.
I know that it is like this, I will not come.
However, it will come. I buried my head, I want to finish the rice soon, so get rid. This taste is really uncomfortable.
However, I will realize that I can't do this. You think, you get up in the cafeteria of Shanghainese, walk out of the door, pass many tables. Then accept the baptism of everyone, even more miserable. The only way is to let them go first, I have time, I am not moving. Ha ha. So, I will have a little eating immediately, and I have to show more than the college girl.
In fact, these are all my own thinking, people may not take me seriously. Anyway, I am not comfortable.
By the way, what to eat tomorrow? Rely, I really didn't pay attention. It seems to be a powder steam, there is a egg soup, and a fish-flavored meat. I really didn't impress it.
The taste is, halo, there is no product at all.
I don't remember what I have said with Xiaolin. Anyway, there is no sentence.
Xiaolin has been eaten very early. Look at me to eat.
I think I am very laughing at the time. Almost there is almost the same side while eating.
I just remember that I asked a very funny words.
I said: "The Public Security Bureau does not have a casual clothes? How do you wear uniforms today?"
At that time, Xiaolin laughed.
"Here is a office building, generally not attendance. Of course, we will not wear clothes."
I have been waiting until people walk. I made my eyes on the eyes of Xiaolin's eyes, and immediately said, I ran out of the garlant.
When I went to the gate of the Public Security Bureau, I was easily. Suddenly I feel that freedom is good. Halo, it is not a prison, what freedom is coming out.
Oh, anyway, the feeling is good.
Under the "escort" of Xiaolin police officers, I returned to the unit. The police car, walked to the gate. Really looked up with chest.
That guard apparently recognized me, because the police car should evoke his memories, the grandson is surprised to watch me, there is no saying, but I still didn't ask me to give it to the certificate.
Later, all the security papers have never asked me to have an entry. I do not know why. Just don't ask me.
Go back to the office, naturally, you can't have a trial of your buddy. Even Li Yuanyuan, who our office, come together.
I said: "The beauty of the Public Security Bureau is much better, the public security burea is really fucking, the equipment of the Public Security Bureau is really grandma." In fact, in addition to the truth I said, others are teasing them. of.
Several buddies said that they were flowing out. I said, give me how to introduce one.
Li Yuanyuan said directly to the other buddy clouds.
Everyone played, and then began to make their own things.
I have always been a router password that I have a long router. Now calm down. See the download speed of the network is still around 10K. My gas is not playing. You are not benevolent, don't blame me. Less less, you must make some meaning of the point. In fact, hackers are not in the performance of many works. A machine that is not open, even the prohibited machines are prohibited, that is, you have a big thing, how do you? Online hackers, you are too powerful, you must also abide by the Network Communications Agreement, you must also communicate with the other machine. I remember that a company in order to indicate that their server is safe, actually hacked hackers. But everyone scans it. It's not working at all, and the connection cannot be established. The service is not open, do you say this is not a lie?
Attack a server and attacked a well-known personal machine. I think the latter is more difficult. Many people don't want it. it's actually really easy. The server, he must consider the user 's use in any case of the prevention. For example, the user's ability to use, the user's efficiency, etc. He must have a port to allow connection. Otherwise, how to provide. As long as there is a service, you will definitely have a vulnerability as long as you are allowed to communicate and connect. The operating system is not, the service program is. Anyway, someone will find a vulnerability sooner or later. But the personal computer is different. He only considers him to visit others, and he does not consider accessing others at all. Therefore, do not open the service, prohibit external connections. Almost do not open an excess port. It is really difficult to break this machine. Of course, the personal computer that even the password is no longer discussed.
The computer of Hu captain is a strict personal computer. Although Hu captain did not understand the principle in terms of the network, you told him to compose a more complex web program, he definitely not play, but network operation, network configuration and protection, he is absolutely not a rookie. And it can be said to be a master.
Our unit's computer scanning is not me alone on his computer and network department. It is the buddies in their network, usually often take a test of his computer.
At the beginning, Hu captain will respond to the strict protection of its computer protection. I remember that I first swept his machine, he found out. I sent me a message using Windows: "Don't attack my machine, I don't like it!" I returned "I just checked the safety. I didn't attack." Later, there may be more people to scan him. The guy is also numb. It may also feel more secure. I will never pass what the messenger service will send a message.
Sentence truth, many people think that Windows is not safe. I have my own opinion. In fact, Windows security is not very good in the ghost IIS, and it is the default configuration insecure. Windows is really configured, nor is it so unsafe for everyone. I strongly recommend that you don't need it. He is often the maximum generator of security issues. There is also a Windows IPC $ empty connection. It is also a hacker's breakthrough line. There is also the information leakage problem of Windows. In fact, these are all solutions. But the default setting of MS does make me despise. His default settings, the security issues mentioned above exist all. Haha, attack a Windows computer that is default settings. Anyone who knows a computer is almost no attack. This is fine in our UNIX and Linux. The default setting for the Linux system is basically very strict. Basically, you can't make you have a chance. Window's biggest failure and maximum success is: hide too much thing to users.
For professional users, hidden things, professionals can't know how the computer has opened those ports, what is the role of these. This is the root cause of professionals despise MS.
For ordinary users, this hidden is very popular, but his default settings have buried too many vulnerabilities.
Unix and Linux are good. You have opened WWW. If you scan, you will find that only 80 ports are basically. Clear clear, clear. The administrator has the bottom of the heart. So, on the server, I think UNIX and Linux are essentially better than Windows. One of my buddies and classmates said. He said: "Microsoft is to consider ease of use and function, then consider safety. And UNIX and Liunx are first considering security and stability, and then consider easy to use." I thought it would see blood. Of course, in the personal calculation of the operating system, I think Windows is the most successful. This is not unknown. MS has today, it is absolutely not blown out. It is still played by strength and market strategy.
The Huali's computer is a machine that has been carefully modified with Windows2000. And the virus firewall and network firewall are also installed. Sentence truth, I can't access it. Really. All of his machine has all made up, and no service is opened. Empty connections are also prohibited. So, I want to make a machine basket screen, I think maybe it. But I want to enter his computer to install a back door. I can't do it.
The hacker is like a magician, and the outsiders look very magical, but tell you the answer, you will find that its practical is some principles. Nothing is magical. Hackers and magicians are people, they are not God.
As for the network, the swing is swayed, and the captain of Hu Hu is not there, and give him the back door. It is not impossible. But that, it will be discovered soon. I was found. There is nothing to do. He is not a fool, he reloaded the system, I see what you do? Moreover, this way, I am a little bit no, you are not as good as directing his head with a gun, told him to hand over the password, I think he will not pay, huh, huh.
I am particularly annoying some obciator and idiot director to establish a hacker image in many people. They can always want to enter where they can enter. I want to get information. That is, their thinking is: understanding, there is network = can enter = can control everything. Of course there is more idiot. No matter whether there is any network = can enter = can control everything. Even the other computer smoke and explodes. Oh, I have only laughed. These idiot's imagination is not blown. What to turn people on others on others' accounts. What to steal the latest information on the army. and many more. Even Iraq is a hacker's credit, etc. All TMD fart!
In fact, do you know which hacker in this world has made a fortune through hacker? Anyway, I know not.
I just know that a lot of hacking is actually a bad. I just know that the good hacker is the safety adviser or security expert as their home.
Said wearing, the computer is a bubble, he does not directly create wealth. In the case of fighting, he is absolutely nothing to eat when you eat. He is a bunch of scrap iron.
There are many restrictions on the Internet actually. Not what do you want, how is it. Even if you teach you yourself to install and debug a network, there will be a lot of trouble. Not to mention where you have no authorization, what do you want to do?
You really thought that the network designers, you really thought that the network administrator was idiot? If you think so, I tell you that you are an idiot.
You really think that the bank's maintenance personnel, the design person of the bank system program is idiot, you want to transfer, you want to wipe the data? Do you want people to be paralyzed? These designers are experts in that field. The problem of studying people in a lifetime, letting you say that it is a drill point vulnerability, the most is a debugging expert, the hacker is so easy to break?
Even if you have successful transfer. Even if you delete the data is successful. I said even if I said. What's the matter, can the money come in your hand? The backup system of people, the wrong check system of people. People audit system do you think it is true? Do you think that billions of telling you to turn? Joke. A big joke. It is to retreat 10,000, you have succeeded. There is still the last trick, people give you the network cable. People don't give you a service. You are amazing, can you fight people?
In fact, the vast majority of hackers in the world is a drill fly, and it is "secretly enter, don't shoot." But it was found to be late and later.
You have seen the banking system because of this bankrupt, stop business. Obviously not?
Because the banking system is all unified solutions, almost no hairs can drill. Even if you come in. There are still many measures waiting for you. It will be discovered soon and will soon be corrected. You have no chance at all. As long as you pay attention to you, you are not there. Many hackers have successful because the other party does not pay attention, and the measures are impossible. Of course, these places are generally unimportant computers.
So, I have no way to the computer of Hu captain. No, no. Not afraid of you joke.
However, the computer of Hu captain is strict, and other computers are not necessarily strict. It can be said that our computer, in addition to the network, all SERVERs of other sectors are basically controlled. Because they are not professionals. Later, the people in the network talked patch and changed. Oh, but for me, it is late. I have already paid behind the door. So even if it is, I can enter it.
My back door is written by yourself. Small and delicate. It is directly inserted into the code to other process space. So, you have nothing to do at all through the process. In fact, it is a virus. However, this virus is not destroyed, not infected. But you can do my internal should. Since Windows is stored under storage, that is, your other processes or process permissions are not enough, you can't access other spaces. So the general people will leave a process. But my program is to modify the kernel of Windows, so you will be 0-level rights, which is part of the operating system. The general people find it all. Especially the Windows system is so complicated. Many people don't understand what this is what should be. It is impossible to find it. But to communicate with other system, port is definitely necessary. This experienced person scans a sweep with ports, which can generally see more ports. Or how did the system have not opened?
Due to this technique, I have been a very brain.
But in the end, I still came up with a way. Successfully solved this problem.
In fact, port scans are to establish a connection with the other party. If the connection is successful, the port is open, otherwise it is not open.
Due to ordinary network programs, they are all TCP / IP standards, so of course you open a port, and the program can be connected.
But my back door, I intercept the connection function. And intercept the packet. If the packet is not my special data. I know that it is a normal scanning software. I will not respond. So the other party thinks that this port is not developed.
If it is my program, I have a special data identification. My program will respond. In fact, these truths are all known.
So, I installed the latter program, even if the buddies of the network, Hu captain used the eighteen weapons to check, still did not find any abnormalities. But the machine's machine is blocked, and the vulnerability is blocked. So I have never had a chance to go in the back door.
Now you can only pass the other machines, see if it is a bit progressive.
I went shopping online and enter the equipment.
A window will pop up and say: Please contact the responsible person to download the device report generation program at the device office and submit the device report as soon as possible. At the date of see, it was just issued.
My mind is a flash, hurry, and Hu captain must also download it. Must be driven in front of him. Thinking of this, my hand began to skilled the keyboard and launch my connection. I want to connect the server at the device.
The latter door is still there, the gangs are more dishes, and they don't have the server to play.
Use my client to connect. Command.
In fact, the character interface is absolutely the fastest. I always think so.
My finger keeps flying, familiar with the directory of the device report generating program.
Then download to my machine and put my back door program with an EXE bundle to put him together. Soon the server will be replaced with me. The file size is about 100K.
However, the level of gods in the equipment is impossible to discover abnormal file size.
I took a breath, and I stopped my client to start scanning. I hope Hu captain didn't download before I did it.
Obviously the departments have seen this notice and download and run. Because my client has more and more display.
I am very familiar with IP distribution in our department. I saw the Finance Department, I saw the logistics, I also saw many departments and department IPs. However, the IP of the network has not yet appeared.
Is it so fast?
I am thinking, a familiar IP jumps out.
Hu captain's IP, I almost laughed.
The head of the dog day, you are smart, today I also have my care, now I am afraid of you, your computer is in my control.
Oh, as long as you log in to the router through this computer, huh, your password has also ran?
I know that Hu captain is absolutely only on his own machine. His security awareness is still there. Ha ha.
14. Software Development Department and the War of the Network (9)
I saw that Hu captain's IP appeared in my monitor program, I know that Hu captain has run the report generation program with my back door program. My program has already taken roots in his program.
I sent a test signal in the past and I got a response. Haha, it's right. My program has begun to have an effect.
When I first packed the report generated program, I have already hit the housing of the super terminal. This housing is actually a thing that records the keyboard tap information. very small. There is also a program that the other party's firewall is to be destroyed by the WINSOCK function. Otherwise, I will intercepted by the other party's firewall. The firewall is actually a hook of a Winsock2 function, which is equivalent to interrupt interception under DOS. However, there is no concept under Window. Change the function.
This is not difficult for me. It is very difficult to break through the firewall from the outside, but it is not difficult to work from the inside to the firewall. No matter what firewall you, I will make you intercepted the Winsock function, you basically.
As for the virus firewall, it will not have any influence on the communication at all, so you can no matter what him. These things I wrote, and those virus firewalls are not used.
I open the monitors of the other party's super terminal. There is no response. Needless to say, the other party is not used.
It must now be used to use it.
It's ok. He always uses it one day. My program will record his keyboard to the file. I just wait, it will be.
But I can't wait. If he doesn't move the router for a month, do we endure this 10K download speed in a month?
In fact, I want a speed, I can make a proxy through the SERVER of the Finance Department. But always think, the result is the same. But the nature is different. I have to control myself, I also said that I am a hate Hu captain, or in fact, I want to confirm my strength. In fact, some people say that hackers are essentially self-satisfaction. I have some agree. Most of the hackers are hackers, they haven't thought about getting into the computer after entering your computer, and they enjoy the black process. It is the challenge to own technology and wisdom. The real hacker is actually for technology challenges. I can't call this time. Because this time I called, plus the last time, Hu captager will definitely doubt it to my head. In these days, he should also know what I have to decrypt my public security bureau. Basically, we know that our computer people know this matter. I have seen me now, and my eyes are not right. I can't say anything about it. Anyway, I seem to be not normal.
There is also a rear, diligent buddy called, and told me to help him activate the pirated XP. I am dizzy, activating XP patch is everywhere, put me as a million gold oil? I said, I won't. That brother also said: "Rely, even the public security bureau is looking for you, decrypt XP is not a small dish?" I can't smile. "" XP I also got, but I am caught. I could break the time and activation limit at the time. But I can't let him activate online. Unable to activate will not be upgraded. Now that the online crack is very perfect, I am too lazy. I am this temper, I have online, I can meet my needs, I will never write it yourself. Can save the province.
Who is looking for? Looking for his head, obviously he will not care about me. Not good. I want to think, I think that Li Yuanyuan, the Ministry of Development, is the most appropriate.
Because Hu captain knows her programming in our development department is the weakest. She was originally a document. Should not doubt that she can enter the router.
I thought here, I took the documentation to Li Yuanyuan's table.
I asked a document question. She explained. In fact, I deliberately asked. This is natural. Ha ha.
"Yuanyuan, how is your FlashGet download speed" I deliberately asked.
"Oh, don't mention it, it is slow. Talented 10K."
"Take a call to the network to ask. You have not called, everyone is hit, it is to give them pressure."
"Oh, this network is annoyed. I can't see my series."
"Just, call" I keep ignite ignite.
"Well, how to say"
"You said, our network will download the speed of 90K, and then 10K's speed, ask what happened? Hehe"
"Oh" Li Yuanyuan is happy. "Is this not ignorant?"
"It is to ignore them, they are too much." I am also happy.
"Good" Yuanyuan smiled and grabbed the phone.
Seeing her pick up the phone. I quickly returned to my seat. Take my monitor. If you don't expect it, Hu captle should come back to the router soon.
Seeing what Yuanyuan is talking about, then put down the phone.
Sure enough, less than 5 minutes, the monitor has begun to appear instructions. Because this time is directly monitored his keyboard, there is basically no useless data. Basically, his command he entered on the hyper terminal. It's really an eye.
After seeing him into the enable command, I am essain. This is a command to enter the privilege. Behind the router password. Ha ha.
Out. His password is longer, I want to guess it is impossible. I will write a password. Continue to look at his operational order.
I saw him showing the firewall settings and routing tables. After he went out, I immediately changed my backward program into document recording. Then exit the client program, after which he will change the router password, my program will automatically record the file, I can pass the file back when I need it. Each file will overwrite the last record, so it will not produce an excessive issue.
I am very relaxed in my heart. So many days is finally solved today. In the future, huh, huh, the router is in my control. Ha ha. I went to the router to cancel the defined speed. Our FlashGet rushed immediately.
Li Yuanyuan called. Said: It seems that there is no power, I have a phone call, the network will pass.
We all said: Or is the charm of Yuanyuan, and later this glorious task is given to you.
Although Yuanyuan turned over to us, it was still beautiful.
Only I know what is going on. I am so funny. It is not afraid that the Hu captler changes the password. Haha.
Just is beautiful, the mobile phone text message is coming, and it is Xiao Min. Ask me how much? Say to come to me on weekends, a little thing.
I went back to OK. I am comfortable today. Put on the headset, point the nerve of Yang Jiasong, the song floated.
This time is definitely not a dream, you make me an inexplicable impulse. . . . . . . .
15. I and Xiao Min's story (1)
The first time I saw Xiao Min was when I was studying. I have very much missing the time of college. Now I sometimes go to the university where our buddies are located, I saw the men's children on the weekend grass, I'm unlimited, really, I think of the "youth" and old wolf "of Shen Qing. Test you ". I remembered my youth, I envy these simple schoolmates filled with pure.
In the school, I should be a person who is not eye-catching, the appearance. At that time, I didn't know what the sleek is. What is all feeling. I don't have any other hobbies, but there are two things, I am very like.
One is on the machine, watch the computer. Of course this is my major, so it should be a good thing.
Another one is to play the guitar, and now the guitar is the time when you go to school.
Therefore, my intersection with Xiaomi may only be related to these two things.
When I met, it was because of a good ghost at a department of the medical school. This kind of thing in the university is usually. Almost every week has a different evening party.
My guitar play is a show on our play, we went to the Great Hall before the evening. Of course, their series is also coming.
The quality inside the university is really strict, too much talent. Everything is very regular, you must have to go to the actual goal, unqualified will be qualified for formal performance. Xiao Min is one of the judges at the time, and the judges are composed of student cadres.
I was holding my guitar like a soldier holding his own gun in one position. I am coldly watching the show on the stage, and there is a busy set of classmates. The front program is very exciting. But I didn't take it again. How to describe my look at the time, the denim clothes I wore, my hair is slightly chaotic, people are thin, very contour, and wear a sunglasses. Anyway, I like guitar playing, so I don't think other programs are not interested. I think everyone can see that I am actually a "bird" person, despise everything, cold and play this world. In the words of now, it is installed with COOL! Ha ha. Yes, it is to install Cool, but at that time, it is definitely not installed, it is definitely the bones.
So soon I arrived, I heard the entertainment minister of our department called my name. Everyone pays that I still have this one.
So, I took my guitar.
In the university, the guitar is a very fashionable thing. You should also ask the girl's favorite. I don't know why, anyway, a college girl doesn't like to listen to the guitar play. I also believe that only guitar can express the pureness of college life, only guitar can express the simplicity and beauty of college life.
Especially the college students are not professional and gently sing, and there is a charm. At that time, the national campus folk songs were particularly popular. The most popular is your desk and youth at the same table.
I sang at the time is this youth.
This is the song I like, a faint sadness. I like the feeling of faint sadness. I sing with my heart.
At this time, I saw a "judge" in the Qing Du Tower. Most are girls, only two boys. They are all cadres of the royal way. The girls in the University of Entertainment are all able to sing, and they are beautiful.
They listen very serious, I am singing. Really, my voice is more suitable for this song, my expression also shows enough depression.
I saw her, Xiao Min. She still prominent in these beautiful girls. At that time, she was wearing a white sweater, below is a gray denim pants. Very elegant, but very personal. Not sudden at all, but that is so youth. Yes, use youth this word too much. It is a feeling of youth. She is short, very dynamic, but it will not be shaken.
I saw her eyes, she stared at me tightly and listened very serious. I know she doesn't know that I am watching him because I wear sunglasses.
I don't know why, I noticed her. People are so strange, sometimes people you see, I will remember her, and some people, I don't have to feel anything.
I think I have a feeling of heart, faint.
There is no other voice in the auditorium, which is my song, through the megaphone. In the auditorium, many passes have listened to the door. Those "judges" students are still listening to.
Singing, there is still no sound. Everyone is still silly looking at me, I don't have any expressions, I have not said a word. I am very caul, saying that it is, but it is a little bit. Then pick up my piano yourself, just jump out of the table. That stage is not very high. Then everyone reflects it and starts the applause of the pull. I saw the girl wearing sweaters, with a smile on his face, faint. Then I went down to write something on the child.
This is our first time, I don't know who she is, she doesn't know who I am. We didn't say a word, we have seen each other in the stage on the stage, or even, she didn't know what I got while singing.
I know that college students have been very active, they can directly say to their favorite girls: Do we do a friend? But at that time, I was caught in the cold, my heart is flying, it is impossible.
I feel love, the most beautiful feel is this faint heart. Fleaway, floating floating in the air.
The second meeting is inside the machine room we are.
I was the administrator of the computer room. Our computer rooms are student management. Because I am a fanaticism of the computer, and the proficiency of computer operations. Therefore, for a reason, the mentor made me an administrator. At that time, the computer was absolutely a rare thing in colleges, and I was never surprised. Computer Rank Exam is a very important task for the computer system. The outer system to our computer room is almost the only choice. Because there are many other lines without computer rooms. The medical school has certain rooms, at that time, they all arrived at us.
That is my pair, people who come to machine are coming to engage in test. I have to take a test on the weekend.
She entered the machine room, I recognized her. How can I not recognize it. That day, I have been in my heart. She and three female students, later knew that they were all in their bedroom.
She didn't see me because she took the film card to find a position.
Several girls found their position because of their position. I saw she started to operate.
I walked out of my machine, my machine is a teacher machine, not to put together with their machines.
I walk in the machine room, counseling my character. I didn't call her. Because we can say it all.
They are all facing the wall, so she can't see me. I am also a counseling in my heart. To be honest, these people are really stupid. However, my temper is also very good, because when the student's era can experience
The teacher's feeling, I am still very comfortable. No matter how mental problems, I am enough.
She finally encountered problems. She raised her hand.
I went to her side, my heartbeat was very powerful, but my face was full of indifference.
"Teacher, how is my Chinese can't enter it," Her voice is very sweet.
As soon as I saw, she cut the input method to the uppercase, and the input is all uppercase letters, of course, cannot be entered.
"Switch the input method to lowercase," I don't move the sound. "
She stunned, then whispered "How to switch, I will not, huh,". Very small, very embarrassed.
I am secretly laughing in my heart, she is a little confident in front of the computer.
I didn't talk, I went down and helped her press the Capslock keyboard.
At this time she saw my face.
She stared at me, very surprised: "Hey? It is you .... is you ..."
I know she recognizes me. I laughed faintly.
"Taking a few levels?"
She is a bit embarrassed.
"Shouldn't you have any questions?" I smiled and saw her.
"There is a problem. Oh, don't understand anything."
I still laugh faint.
"No problem, believe in yourself"
"Your song is very good, really"
I laughed and walked away. "There is a problem called me."
When I was going down, Xiao Min raised my hand.
"What is the problem?" I passed.
"Can you help me?"
"of course."
"How do I copy this disk and can't be used, only the original use?"
I took a disk and saw it.
1.44M
3-inch disk. The words of the National Computer Rank Test Simulation Exam were attached. It turned out to be a grade test simulation disk.
This is a secret, of course, COPY is not working.
"This is a secret, the ordinary copy is not good." I said.
I think she may not know what encryption means.
"That, can you help me Copy a few copies, our bedroom is now in this. Too nervous."
To be honest, although the decision key is the favorite of my student era. But before the crack, I didn't have bottom. The encryption method of the time was eight. Some is very difficult to crack.
However, I can't reject it at the time. I don't know why, I didn't refuse.
"Can you succeed, not necessarily, but I can help you try it"
"Okay, thank you, thank you." Seeing me promised, she seems to believe that I must decipher. The face is exposed on a brilliant smile. I am looking at it.
"Wang *, where do you live?" She actually called my name.
"How do you know my name?" I am really amazing.
"Oh, the minister of your entertainment is said." She is embarrassed to laugh. "
Then, I asked her name, she told me that her name is Xiaomin.
The people in the machine room go out, I must give Xiao Min to crack this disk. I stayed. In fact, I am also often waiting for others, and I will make my own things. The uncle guards is also very familiar with me. His no matter how late I worked, I don't interfere.
I insert the disk into the floppy drive, use HDCopy to start scanning the disk. I saw a few red E. That means reading the wrong sign. Obviously, the position of these standard red E is his encryption point.
The dense disk is not always solved by making the same key as the original disk. Because some encryption points are unable to COPY. No matter how powerful you. For example, the encryption method of the track seam technology, the method of making the key is inventive.
What I am most worried is that this is this. However, from the results of HDCopy scanning, it should not be used by the track seam. Otherwise, there will be no bad track.
First analyze these bad places first. I launched the interceptor written by myself. He can intercept the invocation of INT13 on disk. Intercepted the parameters of the disk that actually used the disk, you can get a real disk generating structure.
Then I use these parameters to make a touch of disk structure, huh, then the copy of the copy can be used. There is no need to track the program.
Oh, I thought here, I started to operate.
16. I and Xiao Min's story (2)
It seems that this level of rendering is very low. After all, only 20 yuan. His is the encryption method of several irregular sectors. Ordinary floppy disk, is 512 bytes per channel per channel during formatting. But he reduces the number of sectors, increase the number of bytes per sector, such as become
1024
One byte. In this way, the ordinary copy command reads and write parameters using the normal disk, it will report an error. Of course I can't copy.
This technology is too small. I used my own interception software soon I got his formatted actual parameters.
First copy it with HDCopy. Error doesn't care about him. Then I wrote a program with Debug. Several special tracks are formatted in accordance with the parent's encryption point.
Run the above program, ha, can run normally.
Haha, the encryption technology of this disk is too bad.
5 disks were copied in a breath. Located a sigh of relief. Thinking that Xiao Min gets the smile when you get the disk. My heart is drunk. . . . .
Give a crack from the crack to Xiaomin started. We are only officially started. We often sing together on the weekend, I played me, she also sang. Let's go shopping together and we will watch movies together. Others think that we are in love. But from us, we have left the campus graduated, we have not said a "love" word. I just feel that I am very happy with her. I didn't think so much. And usually my spare time is in the machine room. We are not often met. However, every time we are together, I feel very happy. That taste is intoxicated. Is this the smell of the first love?
Until graduation, we did not show anything to the other party, not installed, but I really didn't think about it. I have been very good, it is already very satisfied. Is it necessary to say other?
When I graduated, I wrote a song for her. The name called "Go back", I sang her, when she cried. I first saw her crying. Really, Xiao Min is a strong independent girl in my heart. I have never seen her tears, but she really cried this day. I don't know what it is, what happened to her? She was silent for a long time, and finally said, there is nothing, it is necessary. I don't know if I can meet in the future, I can still listen to me.
I have a sour, really, grow so big, I have a feeling of sadness in the first time. At that time, I knew that their family had contacted her the best hospital in the city. And I was still not fixed at the time. My parents are teachers, everything rely on themselves.
After graduation, the summer, she left a blessing in my message. Putting a photo, saying: I have time to see me, don't forget me. She left, really gone.
I think sometimes people are really fate. After she left, my work quickly became eyebrows. At the city of the city, I have built a software development department, I went. So I was in the same city. But the city is so big, it is no longer the treasure tower. I am excited, but it is very confused.
At that time, our unit requested the new employees to be subject to check. The unit of medical examination is the hospital where Xia Min is located. I hope to meet Xiao Min. I hope to give her a surprise.
When I poured a hospital, I found that I was not easy to find someone. The hospital is very large, and there is almost a school. The seat of my medical examination also has 5, 6 layers high. I don't know her in that department.
I took a physical examination table, and I stared at the female doctor while I have a medical examination. It is often used by doctors who wear white coats, but I just didn't see Xiao Min. I believe that I can recognize her. Even if she is wearing a white coat, wearing a mask.
When the body is inspected, the body weight, height, and inspection body table. It is a male doctor. Take off, let him see. Ha ha.
After the check is finished, just wear clothes. A doctor came in.
Dr. Zhang, please go to the operating room, Director find you. You are here for you for a while, "Listening to the sound is a female doctor, because of the mask. The sound is not very clear.
I didn't listen to her is Xiao Min. I was in the clothes. Didn't pay attention, and she exposed two eyes in her body. It seems that just out of the operating room.
But she recognized me, when she didn't greet me.
The male doctor gave him a few words. She fills me. She holds my physical examination form and looks at the above. I think she saw my name and unit.
"I want to reclaim" she said. I haven't heard her voice yet.
"Ah" I got, I just checked it. everything is normal.
"Take off your clothes, don't talk nonsense!"
"This ..." You are a woman, how can I take off, but I don't dare to say.
I am so red, I don't know what to do.
She really can't help but feel so embarrassed. Pull the mask, look at me, hahaha laughed, smiled at the table.
I recognized her. Xiao Min!
I am also embarrassed to laugh, this dinner, the temper of the prank is still not changed.
We started chatting, Xiao Min accidentally saw me, look at it, she was very happy.
"I have to take the root in this city now, we can meet again" I am happy. "
Xia Min stared at my smile, and finally said: "Today I ask, what you want to eat"
"The guest will take advantage of you today. Hehe" I am greedy. We often jokes like this time.
When she got off work, we went to eat spicy crabs, and the taste is really good. I don't know if it tastes good, or my mood is good.
Xiao Min wearing a white dress, looks like a butterfly.
She is also very happy, I have a drink that day. Drink 2 bottles of beer. Just is the head dizziness, but the body is normal.
I said a lot.
After it, I invited her to my new unit in my new unit, she saw the guitar.
She wants me to sing, I will sing. Sing, and the situation in the university is naturally different.
17. Military exercise
Thank you, I like to watch the novels I wrote. Many friends say that you are a hacker article. How can you have such a living, a hacker's image is no, you watch a movie, do you see other novels, hacker? How did you say that the hacker Xiao Wang is nothing to do with me? How to be almost the guy in our unit pipeline room? How to spend so many times to say the first love of the protagonist?
This is the main purpose I want to say. I have seen too much hacker articles, and hacking movies, too fake. Now that hackers in everyone have "hero". I have written this novel to show you a real hacker world. Hacker is? Hackers are ordinary people in computer technology and network technologies, so many people in the world. But most of them didn't put their energy and technology on attacking computers, but such as the protagonist of this novel, spent their own technology and energy on the attack computer, so Xiao Wang became a hacker, the head of Xiao Wang in the article child,
Open
Dr. is just a general computer worker. In fact, the theoretical depth, the technical level, I think
Open
Ph.D. is definitely better than Xiao Wang, this Xiao Wang is also advocating.
A hacker, an ordinary person living in reality, what do they change because they are hackers? They want to marry and get married, to buy a house, to raise home. Although he has the fanatics of computer technology, they can't just know Crack all day, they have blood, they are ordinary. This is the real hacker. All the plots and characters of this story are their own personal experience or friends' experience, or the real thing that has been seen in life. All is a living prototype. This exercise, which is written, is also there. Of course, the details are also necessary. Otherwise it is not a novel. Ok, let's pull the topic, let's continue to say Xiao Wang.
Now I am going to work every day, the first thing is to open my client software, and pass back the button information of the hyper terminal of the Huali Captain computer. To be honest, the Hu captain is fine like a monkey, and the password is regularly replaced. If you don't have a back door, it really doesn't matter. Hu captain's "persecution" of our network has never stopped. However, each time it ends with failure. It took the rest of the two routers, basically, I got all the controls of our partial network. Every time, he changed the settings, I changed very quickly, and I started Hu captain and thought that the router failed. I saw the engineer of Huawei service provider for several times. I must be a call for Hu. Of course, the router is definitely not bad. Of course, they will come back every time.
The head of Hu has been suspecting our head, because he knows that our head is to engage in network encryption technology. He suspects that our head may have a secret technology he can't know. He didn't doubt me, although he also knew that I gave the public security bureau to decrypt things, but I thought that he thought that I couldn't even have his router.
This is later, I listen to my head.
"Hu captain actually doubts that I have moved my hands and feet, although I didn't say, but I mean." The head likes to laugh at me. "
"Oh" I am smirking.
"Some people do their hands on the router, this is sure, but not me." The head looks at me.
From his gaze, I know that he knows that it is my hands and feet. The head is inner, I can't afford it. If I do something is a little smart, my head student is the real frontier science. Many of the apertures are published in international authority publications, I don't know much, I don't understand, I don't understand.
I am smirking. Everyone is not as illuminated. Look out, the head is actually hidden.
I have to write to my software every day. I will find some program tracking when I am nothing. A good hacker. It is definitely not able to solve the next hacker software. Basically, the hacker software that can be used online is outdated and the passers-by, dealing with the real network management, and your things don't have any effect. A true hacker has its own things. And it is generally constipation. I never released my hacker software to the Internet, and I won't tell my own vulnerability to anyone. The hacker depends on the technology that others don't know, tell others, is there any meaning?
Now I am tracking a very popular FTP Server software under Windows. The name is Server-U. I have a 4.1 version now, and I have been tracked for a long time, and it is intermittent. To be honest, the idea of this software design is very worthy. First he uses its own independent account, and there is no association at all. Avoiding an improper security hazard settings. Second, he adopted a strict authority system with more permissions and fine. There is also his IP control function and speed and space limit function. Really very easy to use and safe. Basically, there is no good function. However, his efficiency and stability are relatively weak.
This software is charged. To register. Oh, this I have already abolished him. His registration code uses a very complex algorithm to change. I have not crackdown so far. However, his dynamic anti-tracking and anti-revision are very weak. So, I will jump directly from the program of the registration code. Actually, there is no different, work is normal. My current purpose is to trace his communication part. Perhaps some vulnerabilities can be found. According to my experience, there is no program is perfect. The existence of vulnerabilities is absolute, just see if you have any ability to find it.
Tracking programs are very difficult, and it is impossible to see every piece of code. Otherwise you will definitely be exhausted. Of course, it is not impatient. I am very quiet.
I slowly read it, I will record it on my book. The human memory is limited. Must be recorded. Writing with advanced languages, now is a compile code, which you can imagine. However, there is also a featured thing for each senior language. According to my experience, this Serve-U is written in Borland's things, not Delphi is C Builder.
It's followed, the phone rang. At first glance, it is a police officer.
Oh, she called me, definitely a password?
I took the phone, it is sure enough.
"Hey, that password came out"
"How long?"
"Oh, in fact, it will come out for more than 2 days. Her password is 8."
It seems that the guy really pays more attention to this document, the usual password does not exceed 6 digits, but the current password is actually 8.
"Your luck is really good, you should go to the sports lottery" I have a good mood, open your joke.
"Oh, busy to organize that file. Sure enough, we think about us. Now, today I invite you to eat, really thank you very much."
"I will not kill you there," I said.
Xiaolin police officer laughed and laughed into my phone. I quickly left the ear.
"Reassured, this time I invite you to eat it. Oh, I still have something to say." She suddenly,
"5 o'clock, I will pick you up."
"Don't", I'm saying, "Don't open your bad police car, the door is not right,"
It is a laughter. "OK, OK, I don't open the police."
"Say it, don't see it," I didn't want to spend my resignation, she hangs the phone.
Put your phone and continue to track. Soon I found that Server-U had a rejection service vulnerability. Refusal service is that the program will stop service. Essentially an overflow vulnerability. It is now too much overflowing vulnerability. No way, C is too wide. There are too many people who are not proficient with c. Just send him a special format packet, Server U will overflow and will stop service.
If I analyze it, I can perform a special overflower, let him execute my command. Oh, I fell that, I will let her do my directive.
I record this data format on my book. Below I have to study if this overflow does not let him refuse to serve, can you give me something.
I am thinking, my head calls me.
Go to the head office.
"Hehe, huh, huh, you are now celebrities" Head looks at me. "
"Oh, what is wrong, don't go," I am in my nice, and my Server-U is tight!
"No, no, the minister is a special name, others don't, you have to be happy, your own can be so appreciated, and there is also light on his face.
"Hey, I am annoying, the minister is nothing all day, every day and the public security bureau is very active," said anyway, Minister heard. Oh, I am not afraid. "Hey, let you go to you." The head smiled and said.
I sighed and packed the notebook on the table. Say with the buddy and Yuanyuan. "The buddies have been in the headquarters to enjoy the blessings," in everyone, I left the office.
Or the office, first saw the minister, special attention is whether it is a public security bureau, so it is directly to see the minister.
Rely, this time is not a police, this time is two soldiers.
I still have not been thinking about thinking, the minister has seen me, this time, there is no one of the other departments of Hu captain. Just alone.
"Xiao Wang, come, come in, sitting" minister already knows my name, very good attitude. In fact, the greater people, the better the attitude of the subordinates. I do not know why either. Anyway, Minister, in my heart, it is actually quite kind.
"These two are comrades of a certain military area. This time I need a little thing to participate." Minister began to introduce. "The password of the last public security bureau is that the password of the last public security bureau is that he helps me."
So just hold hands. To be honest, our family's three generations have no one as a soldier and as a police, so I don't know very well, I am not very good, I don't think it is very good.
I pay attention to the two people's high-ranking soldiers, a young school army, a lieutenant rank. Wearing the clothes string. Very mighty. When you have a handshake, you will obviously feel their power. The military is different.
That young school looked at me: "Our military area should engage in joint exercises, some of which is the confrontation, this is our first exercise, our technical strength is not enough, so we need to tempitate in other departments. Excribling some technicians to assist us exercises. During the exquisite period, all the original works of all the original units will be inconvenient. Our army will give some subsidies. These subsidies are not a lot. We hope you to participate. Do you agree? "
The military speaking is simple, I will understand it. I didn't talk.
The minister said: "Xiao Wang, you make our unit, we hope that you can help the army sitting some things, rest assured, you will not affect anything in the unit."
Halo, the minister said so, I don't want to go. This is not a clear, want me? If I say NO, I don't want to mix it on the unit in the unit. Is it a trouble?
"How long is it?" I asked
"For about 15 days, there will be no more than one month".
Oh, I didn't expect to be a month of the soldiers. I feel funny, my mother, how to break what I have given me, these things, I will not dream about this!
When the university military training, I wanted this time to confront, there should be no military training. Besides, go see what the army's information confrontation is going. Not bad.
I picked up agreed that the ministers and colleges were very happy.
"We will pick you up next week."
Then invite me to eat. I said that I still have dating. Minister, haha laughing. Didn't force me.
I have been wondering our minister how today's police, tomorrow's army. How do other departments rarely find them?
Later, I learned that our minister is the cadre of the army. Everyone has their own circles, and the most familiarity of the minister is of course the police and the army. Ha ha.
When you get off work, the mobile phone text message is coming, it is a small forest police officer. She is waiting for me at our gate.
When I went to the gate, I saw a girl waving me. I have been looking for the police officer that wearing a police uniform. Although she agreed that I didn't wear a police uniform. However, she is in my heart is wearing a police uniform. So, I subconsciously I still wear the police uniform. That girl took a half-day hand, I noticed her. Is this not a Xiaolin Police?
She is wearing a purple casual pants today, wearing a stylish sports shoes. A stylish casual clothes on the top. The bag, there is a small little penguin on the bag, like QQ, like the logo of Linux.
It's totally a young girl who is young, where is there a whit police officer?
"Wow, you have changed today, I almost didn't recognize" I walked over. "
"Oh, get off work. The police are also ordinary people" she is a bit not meaning. "
"How, think about it, I ask today, you have helped us very busy" she said.
"Just pull, you will set it out, it doesn't matter." I really invited guests, I am not embarrassed.
"OK, let's go."
The taxi has driven a Korean restaurant. The name is Han Wei Xuan, the place is not large, but people are relatively small, and the layout is also very elegant.
She put a roast beef, and a soy sauce soup, and a lot of things that were suffering from eight, and I didn't have to eat Korean dishes before, so she didn't have a resignation, and A few dishes.
Korean cuisine is truth, not with my taste. But this is not a focus.
The focus is, she keeps laughing at me. I am more stupid, use China to treat Korean dishes, such as what kind of soup is in the wood bowl like a monk, I will drink it. It is also clear that it is not good.
I didn't give him a matter of exercise, because the majority of the school didn't say it. Xiaolin police officers are now, it is still a category of others.
"I find that you have a study on the decryption encryption," she said.
"Where, where"
"There will be a lot of advice after the future."
"Your public security bureau can be a lot"
"Oh, tell the truth, although the diploma is not low, and the famous university is also a lot, but this is not as good as you."
I think she is telling the truth. Although the hacker's knowledge is used as a computer knowledge, it is not a hacker that all computer learning is good. My previous classmates, the results are much better than me. But they are analyzing, and debugging procedures is much better than me. Some people are born to be more sensitive to this thing. I am. Some people are born to this is not interested in this. Think about people such as university homework door, and people who like hacker technology are not a lot.
I know a well-known hacker software in China, and he has completed many basic courses in the university. Ha ha.
"Where are you graduating," I asked.
She hesitated and said a university name. Hey, is also a first-class famous university in China.
"All the things we do all day is not high, like to check the situation of checking Internet cafes. Responsible for computer maintenance of this system, basically don't have much thing. It is encountered like this. But I It's okay. "She is a bit awkward.
"My dream is to become a woman hacker" she suddenly said.
I didn't respond for a long time, I really don't want to believe in this way. It's not the sentence, but her impression in my heart is relatively serious.
"Oh" I laughed.
"What are you laughing, she seems to be reacted, and it is too much to say. Then I laughed yourself.
"I am writing a Windows vulnerability detection process, I have already sent it to your mailbox." You look at it, more feed. "
On the night, I saw the WINDOWS2000 vulnerability detection procedure of Xiaolin police in the mailbox. Basically, all the things you know online. However, it is still very convenient for general protection and detection of Windows, and VC is written, and the interface is simple and practical. Nice. However, the real hacker is not used. Xiaolin is now a popular hacker type. It is a vulnerability type. The ability of their own analyzing programs is generally not very strong. A girl can have this level, telling it, really let me accidentally.
The next day, I was still sleeping late. Xiao Min came over, call me "lazy pig, open the door". I analyzed the Server-u analysis last night, so that the program overflowed, refused to serve, which is very easy. But let her overflow to execute my code, it is really not easy. I got it to 4 o'clock, there is no progress.
I saw it at 9 o'clock. Hurry and open the door. Xiao Min understood me, giving me breakfast. A small packet of small cages, a pack of pots and dumplings, all I like it. Ha ha.
I will kill all things soon. I am satisfied with the sofa, Xiao Min looks at me.
"Xiao Min, I will give you something" I am lazy.
"What" Xiaomin does not laugh today, it seems to have any trouble.
"I have to go to the army next week to take a few weeks. Oh,"
"Ah?" She didn't understand.
I explained in detail.
"So, we can't meet in a few weeks." She is somewhat lost.
"Oh, it doesn't matter, I will come back in a few weeks"
"Today my mother asked me if there is a boyfriend? Do you say what I said, she suddenly asked.
"I am not your boyfriend?" I smiled and saw him.
"But you have never said it"
"Okay, I will say that Xiao Min, love you," I deliberately put "there words, say" the tone inside. "
Xiaomin is unable to hold, laugh: "Didn't go through, I will tell you".
I am silent, I have no everything now, in addition to feelings, I really can't make any promises. In the bustling most, you don't consider these issues, it is impossible.
"小敏" I looked at her eyes and said, "I really like you, tell the truth, I can't help you. You see me now, I really can't give you an envious life. But I Will work hard. I will work hard for our future. "
Xiao Min arrived in my arms, said in my ear: "As long as you have this sentence, I don't need to be enviable, I think it is good with you."
Her hair stroked my cheek, I think so satisfied.
I picked up the guitar, Xiao Min leaned against me, I sang the song "There is you in the life of the water, I am singing, Xiao Min is inxicated by me, I think I have the world.
Because I dreamed that you left, I woke up from crying, watching the night wind blowing the window sill, can you feel my love. . . . .
I have been over, procedures, and vulnerabilities in weekends and smashing.
On Monday, I was notified to the gate. The head has also received a notice of the headquarters, let me go. I don't know what is going on. This is confidential. I also know that the peace of the peace, engage in a exercise, and in fact, there is nothing to talk about. However, the minister said hello, can't shook, and he did not dare to listen. I want to explain it again. Even the buddies greeted by the office have not played, they will go out.
The off-road jeep of a military license plate on the gate, there is also the lieutenant.
Warm and greeted me to get on the bus, the car will go to the military zone.
Enter the door of the military area, there is no different in the outside. But after entering, I feel very different. The green military truck is everywhere, and the busy soldier team runs, and many military vehicles are shipping. Although I don't know about the army, the fool can feel a busy atmosphere. It's a feeling of war.
"What are they doing?" I pointed to a truck on the side of the road, all of which are all armed soldiers, asking the lieutenant.
"The exercise will begin immediately. Everyone is going to pull out" Lieutenant and look down.
At the guest house of the troops, there is a special person to receive us. Then I sent us a military uniform. And other supplies. I am also a military training, and I will treat us as a soldier.
Those who have acquired foreign units, not only me. Anyway, I was at the same room with my room, a child, fat, short, wearing a glasses, and there were not many words. Very kindness to people. The name is Zhang Shulin. We all call him old.
Old Zhang is from a famous virus software company that specializes in viral analysis.
There are two people in the next room, one is a young guy, I heard that a famous gang of a famous hacker organization is a famous university teacher. We call him Xiaoyu.
Another is also a young people, a administrator who is more famous here. We call him Xiao Zhao.
As far as we are, all men, but also young people, old Zhang actually counts young people. Hackers seem to be young people, especially in our country. What is going on, I am not clear, anyway, the fact is just the case.
I didn't talk about technical issues when I was in the room. I don't like to say, he doesn't like to say it. To be honest, he is really a very little person.
There are more people in the next room, after all, young people, and they always hear the bails and Xiao Zhao said some hackers. For example, Chinese and American hackers are like a Chinese-Japanese hacker war. Simply happened. Generally, I don't talk, occasionally two jokes. I still prefer to be with old.
I opened a meeting in the afternoon, we went to the machine room in the military. We completely understand what is going on.
It turns out that we are not a person in the military. We are actually a party, such as we use the Blue Army and the Red Army instead of the exercise. We are actually the Blue Army invited. To put it bluntly, the gunner is mainly to deal with the problems that cannot be dealt with. Of course they have specialized information against the complex. Later I understood from the population of the army, in fact, this is usually usually in the army. When the exercise, the troops were really in the army to win their brains. Both sides will use their own relationships, requiring local support, and obtain the leader. In the past exercise, there was a special detachment, borrowed the place where the car was borrowed, and hid in a site, the people of the people sneaked into the other party's headquarters, and put the people's headquarters. ,one way or another. The director is still a victory. This is the case, the official you use means, as long as it is not illegal, the last victory is the principle. People who have done in the troops must know that this is true, and the troops are very popular with local universities. Nothing is very unique. After all, it is a training in peace.
It is not difficult to guess that, in fact, the Red Army also invited a lot of people, because this time they first exercise confrontation. So everyone is not in the heart. Talkingin, the commander of the two sides is really not understanding. They are all how to say how to say their civilian cadres.
We went to the blue army's room, leading our captain's surname Liu. I heard that the graduates of the University of Defense Science and Technology, in the 40-year-old look. It is the rank of the colonel. Wow, the army is high. He is full of young people under the age of 30. In fact, 5 people. Most people are young or lieutenant. There are still two people being a civilian epaulette. Oh, most of these things are young people, I see that the army is no exception. To be honest, their room is very common, all of which are clear, Tsinghua Tongfang. Later, the configuration is PIII
800M
CPU, it seems to bought some years. Of course, there are several servers, more professional, the configuration is also relatively high. Look, the housing is hp proLiant DL of HP, put it in a single room opened in a glass, and put it inside the cabinet, look like Many expansion lines inside. I can't see it carefully. This should be bought before. There is also a Dell PowerEdge 6600, hey, this server is sure new. It is a tower. Put it inside, like a stone, the panel is all holes, the Dell's logo is eye-catching, and there is an Intel Inside sign in the lower left corner. This server performance is a fight in IBM's xseries 440. Others are nothing special. Anyway, I think it is better to be equally configured. However, it can be seen that our army is also in construction, such as that of the Dell's server is not bad. The notebook used by Liu captain is actually a violet. Ha ha. Like our unit.
Everyone introduces each other. Then Liu captager started to tell the mission.
This time our information confrontation is divided into password crack, network penetration, cyber attack. It is simple to say that the Red Army and the Blue Army network and servers are along with. Everyone's combat plans and intelligence must put them on their own servers. Protective means you want to think, but you can't break the cable, you must guarantee that Friends can communicate normally through the network. Then the two parties team began confrontation. Do you make the other party network, or steal the other party's information. Just as you are so simple. Of course, there are other confrontations, such as electronic confrontation, those who don't care about us. We only have a network.
Finally, Liu captan said safety issues. Say tomorrow official start. Let us listen to the command, pay attention to safety. It is obviously to our "militia". Ha ha.
At that time, we were 懵. what? There is also a security problem, isn't it a exercise?
Liu captan saw that we didn't understand, it said that the other person would like to be afraid of special detail to destroy our information against the team. So everyone should listen to the command of the police.
Mom, it is like real. People who have not participated in the exercise may not know. Nowadays, our country's exercises are divided into several, and there is a performance type. But more is this kind of training exercise, that is the same as fighting, what is the use of what is used. I realized that I realized that I really did the same as fighting. To be honest, our army's information is really general. This is not very big when it is actually fighting, don't listen to some people. But our country's soldiers are really powerful, not saying. I am in touch with the police, in fact, I don't know what is the police. Anyway, the soldiers who give us a warning are really amazing. Hey, it is really amazing.
The next step is to discuss the security issues of our servers. This thinking is still right, now I can't attack other people, first put myself safely.
The first is what operating system is used. Their server is that Dell 6600. The original operating system is RedHat 9.0. Liu captain let everyone discuss whether he uses him. Use him safe.
Most of them agree to use RedHat 9.0. Only I am against the old.
In fact, Linux is quite unsafe to the hipster, although the UNIX design thoughts he use. But because there are too many modifications, his new version of BUG is quite. For example, there are many problems in the 2.4 core. One of the questions is to overflow a lot. Many overflows can be used to do a denial of service attack. Although the refusal service will not make the data loss, a goal now is to refuse service. Although there are not many people who can use this vulnerability, the other party must have good hands, so I think it is quite unsafe. Old Zhang also seems to be a hipster. He said: "Linxu 2.4 kernel has a loophole for the deny service. It is recommended not to use.".
Everyone didn't dare to talk.
Liu captain said: "What is the operating system?"
In fact, my heart is thinking, the safest is to write an operating system, so that the other party may be unclear, let alone attack. Ha ha. Of course, this is obviously unrealistic.
Everyone began to discuss what operating system.
The information team, said, then we use the 2.2 kernel Linux. For example, the Debian version is not bad.
Net management Xiao Zhao said: "Simply use UNIX."
Xiaoyu said; "It is also good to use Windows."
Old Zhang said: "Use freebsd"
I said: "Use openbsd".
Everyone's opinions are what I like to use. Ha ha.
The old opinion is consistent with me. Our point is what is unique on the basis of stable and safe. Because the other party knows less, the more secure it, the more secure. It is what he analyzed will also spend longer than the system familiar with yourself.
Finally, Liu captain stood on the side of me and old. Old Zhang also agreed to use OpenBSD, more people who support UNIX, BSD is also Unix, so my opinion is adopted. Of course, the task of installing the configuration server is falling in my old man, others help check the vulnerability.
Then discuss how to communicate issues. Because our server must guarantee that Friends can get information from above. Upload information, the Combat Command is also communicating above. This is a security hazard.
Some people have filed the use of WWW communications and immediately rejected. This is very unsafeful for this hacker.
Some people have proposed FTP, which is also denied. This is also too dangerous.
In fact, they have long developed a command system, based on web. They want to use this thing. Because other departments have become used to this way.
I don't know how this system, so I didn't speak. But I don't think it will be safe. Because, I think the web system is the least unsafe. There are too many vulnerabilities.
Therefore, I recommend using a set of spare systems. In case of being broken, you can use the spare solution, not completely paralyzed.
Everyone agrees.
Then, everyone says that this short time is designed for a spare system.
Old Zhang said: "Then design a self-simple FTP. You can transfer files with each other. But the client cannot use universal ftp, otherwise it is easy to be seen. Old Zhang's meaning and I don't see And. Later, the later thing proves that we prepared this spare system is very implied. So the character is handed over to the old.
Hey, almost these things are given to me and old. If you don't blame others, you will blame me and everyone say that everyone is not very familiar. Everyone can not be confused. Look out, other two, network management Xiao Zhao fuse long configuration popular Unix and Linux systems. Xiaowei Long Windows system, but unfortunately, it completely abandoned the Windows system. The soldiers of the information team have just graduated. Knowledge depth is not enough. Liu captain's knowledge is more old, and the management has been working for many years, and the details of technology are not deeply.
Old Tiandian and virus contact, in fact, the hacker program and virus programs are basically not integrated. Therefore, the bottom is solid. Details clear. I am, oh, of course, it is more experience, and it is very comprehensive, UNIX platform and Windows platform are familiar.
The division is over and started. I started to install OpenBSD on that DELL. These software have in my bag. Since just installing the server, all minimal installations, no 400m installation
. Hey, you can say that you can fly in this calculation. Dell's server workmanship is very good. The firewall has installed one written. This also has a monitoring feature, this is what I used to defend my machine. The interface is all character interface. Turn off all ports and install the latest version of Apache. Put them in the command system. The firewall opens the 80-port. I originally wanted to change a port, but later thought, the other party is not idiot, there is no need. Simply open, simply open 80. When the command system is installed, I found that I dizzy, and their command system is written by ASP. Everyone still doesn't believe that I don't believe it, but the truth is that this command system is written by ASP. I am not saying how unsafe ASP, the key is that ASP is generally mixed with IIS, and that IIS is absolutely unsafe.
My heart is sinking down, day, if I have to worry about IIS, I see this anti-counterfeiting. Later, I realized that I didn't expect to confront when designing this command system. Said wearing, just in response to the call of the science and technology Jianjun, Liu captager also known, but now the system has been recognized above. Requires promotion, you can't afford it. I believe this. Because this kind of thing is too much. Does our unit's Hu captain is not because Flash is well used, and is it deeply appreciated?
Oh, there is no way, just download an APAHE ASP module. III I am absolutely afraid. Ha ha. After installation, test it, they have to command the system to run. But the database system for command system is used to use Windows SQL2000. Halo, it is a safe hidden danger. Immediately modified into a safe database system, I see it is not too late. As long as a Windows 2000 Server SQL2000 is installed on other machines. Then let the vulnerabilities let the small do.
Xiaolu is a certain hacker alliance to have a backbone, which has a set of windows. I saw that he was familiar with the patch, changing the configuration, and what was said.
I wrote FTP with the old manual. in fact. I have already had a program. I have to have this function. So, I have changed the original program and put it on the server. And the port does not need to be open. Because I have to go to the port.
It is designed to design a client program to spend a lot of time. Because this is to use the friend army and the headquarters, it is too simple. I have to write help. We reread with VC a relatively simple interface. It is estimated that people will be able to operate.
Other brothers here are tested me to build a server. They use a variety of scanning tools, they can only see me to open 80 ports, others can't sweep. In fact, I have to have a special FTP communication with us, and can also manage remote management.
These things are written by themselves, so they are generally IP bags to detect, and they will not respond to you.
The balance has also completed the 2000 system to configure, and he is still modifying the ASP command system and makes some obvious vulnerability. Of course, some vulnerabilities are not finished. For example, SQL injection attack, I looked at it, the command system was a bit trouble. Many places do not check the input, left a lot of space for the other party. I didn't say, I know, there is no. Instead of sinner. When I hope that the other person will not use it.
Everything is ready to stop, we put our backup client COPY inside the CD, Liu captain let the correspondent will send each department. Liu Captain entered our server all the information used by the command system.
Then I said: I will pull it with the troops tomorrow. Everyone sleeps in the morning, obeying the scheduling of the police. Below to the military and tools to receive computers and tools. " Hey, I have to receive a computer, what computer is it?
We wear a question mark of a brain, follow the information team's gods to the military, then see the bag of a layer of rectangular camouflage. Package dots than ordinary notebooks. Then a hard Bangbang is still coming out. It's still still coming, don't lie to you. At the same time, there is a small bag and is also a camouflage.
I saw this brother still came out, I thought it was not a computer. The result is opened, hey, it is a computer, laptop. And it is a violet. I didn't know the origin of the computers of the purple light. Later, I learned that this is a military notebook of purple light, VL298 military laptop. Another package is some accessories. CD, there is an external connection. and many more.
To be honest, it was the first time to contact the military laptop. It's really love. Run back to the dormitory, the original P4
1.7G
Mobile CPU. Oh, Zi Guang did not dare to use a desktop CPU this time.
The computer is very heavy. Take a look at the performance, 乖. Real waterproof anti-vibration. I fell on the ground, I really didn't have something.
It is said that there is no matter what to put 100 ml on the keyboard.
Later I saw the information team's buddy machine dirty, just rushed under the faucet. Cattle! It's a cow!
I remembered the "highlighting the heavy" to the SB director, and she raised the Lenovo desktop in the wild tent to command the battle. I got almost vomiting blood. Aunt, how to solve the problem of the wild power supply. That is to bring your desktop to the battle to booming a few hours, report it, can you open?
Look, my computer, this is a military computer. Self-soled battery can stick more than 8 hours. Cross is on your body, which is similar to the backbone bag. Touching and climbing, really no problem.
Reporting that too much computer, configuring the software you may need, the operating system is Windows 2000. Haha, it's okay. Personal computers are not afraid.
It's so excited that night. . . . . .
In the middle of the army, the army was awakened, and it was already a footsteps outside, but it was not noisy. Old Zhang shouted: "Xiao Wang, get up."
In fact, I also woke up, the feeling of military training did not completely fade in my mind. I quickly put a good clothes and back the computer. The car motor outside, the roar of the helicopter sounded into a piece. When we ran out, we stopped a camoupled Evico at the door. The 5 bodies of the information team are already above. We also went up. We have no weapons and have no helmets. But there are 10 police soldiers with the car. The camouflage oil painted on the face is very horrible. They are all pending, except for bulletproof vests, it is available.
The curtains on the car are strict, the car is started. The exercise begins. We don't know where to pull us. I just hugged my notebook tight. A confused in the mind.
I don't know how long the car has been opened, I am already a bit confused. Suddenly heard someone said: arrived. I opened my eyes. The car seems to open a place in suburban counties. I don't know where it is.
When I get off, the sky is already bright. Take a look at the surrounding environment. It seems to be a school. There is a playground. Yes, it is indeed a school, I see the slogan written on the facial building: "Study hard, go up every day." It may be a primary school. There is no one in the school, maybe students have holiday. Now SARS is very powerful.
Then, our team immediately immediately led the school to the school, and seemed to see the teacher. Liu captain waited for us.
This is a big classroom, now a lot of works are placed. It seems that Liu captain has carefully arranged. I saw a new machine in the corner. But not the machine I saw in the computer room.
Then everyone, sitting down on the workbench allocated. I saw a 5-class twisted pair on every table. Looking back online, the indicator of a 24-port switch in the corner is bright. It seems to be temporary. On the switch, a Huawei router, Huawei's router, I am more familiar, I will see it at a glance. Then Liu captager began to talk. Here is our temporary work place. Don't take anything casually, what you need to give the police even the soldiers can say it. Our characters are confrontation with the Red Army. The goal is the other party's network system. Let them be paralyzed or stealing materials. At the same time, we must defend our network system to work properly.
No password and information, please do not exist in your hand in your hand, don't use this computer to make any additional communications, because we are out of a router, and our personal operating system is relatively weak. So do not exclude the possibility of infiltration by the other party.
Let's check how we are now safe to see if there is a loophole.
So everyone will connect to the network cable. Start checking the router. The network management Xiao Zhao will go in to the router's password to go in, start setting. It seems that she is very familiar. He set the firewall very demanding restrictions, and then looked elsewhere. Didn't show any problems. Finally, the Telnet function of the router is closed. It is not allowed to log in with the TCP / TP protocol, and can only be set directly through the serial port.
I also checked him as a general server, no problem. The router is simple and solidified. So it is not so easy to have a loophole.
Then, the task is assigned, the information team is divided into two people specialize in the backup of our server. The prevention of the data from being able to recover after it is.
I am responsible for monitoring the movement of our server. Xiao Yu is responsible for monitoring the movement of the server that is too SQL2000. Xiao Zhao is responsible for the monitoring of the system. The rest of the people, in addition to the two people, other people are all looking for vulnerabilities and attacking each other.
As a police soldier comes in, the exercise is officially started. We started working.
Oh, there is no such thing as a TV, our face is dignified, and the fingers fly, and a surprise call is issued again. In the face of sweat, it is also coming slowly.
That's all lie to you, in fact, we are quite relaxed. Basically, everyone scans each other machine like usual. Nothing gains. Everyone is tired, in addition to the two buddies outside the routine, we also got together to blow the cattle.
While talking to everyone, I talked about our servers. The amount of 80 port data on the server is constantly moving, and it is clear that the other party has not restored.
I swept the other machine, but I just opened an 80-port. Yes, RedHat 9.0 operating system. Ha ha.
I said to the old Zhang: "Old Zhang, the other's readhat9, you engage in an attack program, see if he can refuse to serve. Hehe"
Old Zhang Xiao smiled and did not stop in his hand. "I saw it. I am trying to do it. He just opened 80, and there is a firewall, it is not easy to refuse service."
"It's not easy, you have to do it." I laughed.
It seems that the other party is also very conservative, the less the port is opened. First, I entered the command system of the ASP. It seems that the people of their information team are comparative despise the system, and it is also more research. I have seen the information team's gods in the system. The other party's information system is to check your IP, so it is not possible to directly enter the IE. So although there are many vulnerabilities in that command system. We also have no way. The other party's WWW Server and our Server are apache. Ha ha. So the vulnerability is relatively small.
There is basically no progress in one morning. There are a few buddies who have opened several software and perform DDOS attacks. But there is no effect, and you will make the other machine slow down. We are wide, and our servers are like a drop in the bucket.
Of course, they have no way to take our server. Everyone consumes this, saying that information confrontation, in fact, the composition of confrontation is less, personal protecting her own machine. Ha ha.
In fact, the server attacking the other party is very random. The other party is inner line, and the other party has made protective measures. Basically, there is no way to adopt a general approach. Those who know that they can enter any system are basically bragging. Unless he has mastered a public vulnerability, and that vulnerability can also take attacks, this chance I feel that small is almost no. Old Zhang has been engaged in his overflow attack procedure. I also monitor our servers and find Apache's vulnerabilities. They use the apache is the redhat comes with. Not the latest version. I know a vulnerability. But can't use it, I still don't dare. I downloaded a one-to-one Apache version using Softice tracking (although Apache offers the source program, his vulnerability is not found in the source program. Because many vulnerabilities are brought about by the C function) Vulnerability.
Xiaoyei and Xiao Zhao continue to do DDOS attacks. The data storm attack method they use. They mobilized their old black broilers. But the other party apparently presented prevention measures. The effect is not very big. But the speed of the other party is affected, which is certain.
In fact, the IP network is quite fragile. To attack a computer, as long as you open a port, even if you don't open your port, you can't get a DDOS attack from the data storm. Because you have a connection to the other party, you must consume resources. If you establish a connection with you or ask for too much information to establish a connection. No matter how powerful, you can't prevent DDOS. However, this kind of thing does not happen online. Because you may not be able to contact such a computer to attack. And this kind of attack I always think is not true hacker behavior. This is violence, not wisdom. But now is confrontation, one of our goals is DDOS, so I can't manage so much.
At noon is the meal for the warrior to give us, quite rich. There are egg soup, 3 pieces of material, and 4 basins. We all eat leisurely, not leisurely, because everyone has no progress. Our servers are also very good. I didn't see the successful connection of my IP in my monitor. I estimate that the red buddies are also like us.
Liu captain into the place and next-door communication room in our work, come and out. He needs to communicate with superiors to understand the progress of the exercise. When I went to the toilet, I went out. It is found that the warrior warrior is already mad. Everywhere is a postage and defense point.
Continue in the afternoon. Older procedures have made progress, but they have not been successful several times. Maybe his procedures are still a bit of troops. Old Zhang continued to debug. Old Zhang I admire, analyze the virus every day, practicing his solid work and toughness. He doesn't panic as a program. I rarely talk, when I passed him, he just smiled.
I slowly analyze the key code of the Apache version.
The information team has a buddy and Xiao Yu Xiaozhao, continue to send a data storm to the other party and consume the resources of the other party.
Everyone is a bit very spiritual. continue working. Sleeping, we have a shop next to us.
To be honest, our days have been flat and ordinary, and everyone is so good for 4 days.
These four days, the old debugging procedure. Always toned to test. fail. But after each test, the joy on the old face is more than one point, it can be seen that there is a door. Just a matter of time.
I have always debugged me to apache, getting more and more fans. But it is getting clearer. I have found this vulnerability, but how to use a headache problem.
The buddies who engaged in DDOS attacks also insisted.
No way, we are not gods, we can't open 80 on the other side, and even if the connection between the 80-port is validated and the other party has any. The most is to get some data storm attacks.
They also have the same way to us, tell the truth, our server defense is more dead than they. We have useless linux. They use at least Linux. At least give us a hope. They are not the latest Apache, and I also give me a hope. This hopes may not be implemented for ordinary people. But I also said that I'm talking to the procedure such as the old Zhang also said that it may be great. Oh, just wait. My heart is in peace of the breakthrough point of Apache. By the 5th day. It is a bit progressive. I found that a function called in Apache has overflow vulnerabilities. Using this vulnerability allows me to perform any command. Now what I need to do is to carefully design a packet and ask 80 ports. Let the other's Apache produce overflows, and execute the instructions I have performed. This is an absolute technology. I have to be careful. Fortunately, the other's IP check is based on ASP. Not based on the packet-based IP check, otherwise even if I know this vulnerability, it will not be connected to me.
Oh, I installed on our server is a IP package check. Not our IP, the other party has no possibilities at all. Although I actually opened my own FTP. But there is no way to scan.
Many people don't understand why I let the other Apache overflow can perform my instructions. In fact, this is the principle of overflow. As I said earlier, the person who has attacked this principle is definitely a genius. Overflow is light, let you crash, that is, refused. The weight will let you execute the instruction. Where is these instructions, there is a lot of data that exists in the request. Of course, if the other party has the function of executing the instruction. Then there are more people. Some are the backdoor installation of the designer installed. For example, IIS has a bug that can perform local commands, I suspect is actually the back door of MS installation. If you don't have this feature at all in my program, you may hardly let the other party execute the system command even if you find bugs.
I am very confident about my own server. I don't believe that the other party can attack. Unless he finds the vulnerability of Apache and OpenBSD. Otherwise it is almost no possible. Ha ha.
That night I had a good mood because analyzing Apache's progress.
At 12 o'clock, after listening to a life of a water, I'm going to sleep. I have a little thinking about it.
Xiao Min, what are you doing now, have you thought about me?
Falling on the store, soon I entered a dream. I saw that the old Zhang was very mentally debugging before going to bed.
In my sleep, I suddenly woke up by Liu captain: "I am getting up, get up, have a situation!"
A few buddies woke up. I am also, everyone has collapsed. How to pull, how to pull it. Does anyone attacked us?
Oh, a brother of the outside police team is not moving, unlike.
Liu Captain continued to shout, I understood.
One machine in my heart. Hey, yesterday is still happy, now I seem to be a bit happy too early.
I only heard the Liu captain's collection: "Come, hurry up, everyone will check it, and one of our subordinates is the opposite side. His grandmother."
To be honest, Liu captain has always been an image in my heart. I rarely saw him so anxious.
How can we don't worry, we have been anxious, our command house is networked with our server, our command can legally access our servers, although there are some restrictions, such as password restrictions, but each other The information team's hipster, if you use our IP connection, it is easy to make it. Our ASP command system is a big safety hazard.
While pulling my computer, I asked: "What is the IP? What is the IP?"
I have seen our IP connection on my monitor screen.
I heard the IP of Liu's head, I clearly see the most frequent IP on the screen is the IP.
It seems that the other party is more embarrassing, they know that it is not possible to break under normal circumstances, using such a trick. I have to admire the thinking of the other party commander. We really didn't think. Perhaps our superiors may think of, but we have really not thought of our several people. I can't think too much, I immediately started my management software, log in to our primary server, break that IP, and listed this IP in blacklist. Start checking if the other party has a trace of infiltration.
Fortunately, the other party seems to just connect our 80-port, which is to attack our command system, other aspects of the system, the other person has not broken. In fact, through the attack of the command system, there is no way to have too much rights in OpenBSD, this is more confident. But that Windows's SQL is hard to say. Originally Windows SQL Server is a weak link, but because the outside world cannot be directly accessed through the host and outside, if the other party cannot break through our primary server, it will not have actions, but now, the other party has broken through Our primary server, although it is only a breakthrough 80. But there is already possible to connect SQL Server.
The information team and Xiaohe Xiao Zhao found that our command system was destroyed. It seems that the other party has done a lot before we receive the news, at that time, in addition to the backup people, they are sleeping. Even if you don't sleep, we can't know, because of my IP used by others, we can't feel abnormal before we receive the message.
Everyone understands the vulnerability of our ASP command system. If you are allowed, you can attack us here. Although there are many modifications, the code is too much, have you changed?
Everyone didn't speak, Liu captain's face, go out to the next mobile phone room several times. It is estimated that all of our headquarters have found that our command system cannot be used.
I whispered to the Liu captain: "Enable the standby plan?".
Liu captain's face or iron blue, silent for a while, then went to the communication room.
Let's turn all the 80 ports all closed, and the headquarters can only transfer data through our special FTP.
Start checking the system.
My operating system is all normal, but the data loss in our SQL Server is serious, and the other party uses the SQL injection attack method, and the inside is changed. Basic data was abolished.
Here more, most hackers on the Internet attacked the interactive webpage supported by the database, which is most commonly used is this SQL injection attack. This is a completely legal SQL access. So what is your firewall, what protection is no effect. The only thing is to be submitted. Almost all the forums on the Internet have this problem varying degrees. But the general people may have no energy and mind to find these vulnerabilities. But if you look carefully, you can usually be found. Lightly destroys the other party's database, and you can get the password of the other party's administrator. Although the password is added. But someone runs with a computer. It is fully possible to decipher.
Anyway, our first round is lost, and the unexpected, such dissatisfaction is lost.
We are all technically fanatics, so we admire technology attacks, we don't convince this almost no technique for technical content.
Therefore, hackers are actually helpless. There are too many things in real life to transcend technology, and only technology is in this world. Technology is not all.
I have been anxious for a while, waiting for everyone to calm down, I am a little angry. Grandma, bullying us no one? We must counterattack!
I stepively started how to use the APAHE's vulnerability. In fact, if I attack each other, I really let the other Apache refuse to serve, so that the other party is like us, command the system. However, I don't want, because, this is very easy to expose, refusing service will not lose data, and the other party should recover just a few minutes. And if they are considered, the opportunity to continue to use is very small. No, I have to cherish this unusual vulnerability, I have to go back, I don't want to refuse the service, I want to penetrate each other.
Old face is dignified, but also debugging his procedure.
We have a nervous atmosphere for the first time. We feel the pressure of confrontation.
The gods of Xiaolian and Information began to rebuild the database system.
In fact, I doubt that the other party must have obtained the password of our ASP command system. I asked the information team's buddy: "What password algorithm is the secret code?"
They said that it is MD5.
I feel relieved. MD5 is 128-bit encryption. It is impossible to use a computer to run more than 8 or more passwords. Moreover, our password is 20. They are unlikely to run out for a few days. It is not so good that their luck is so good.
But SQL 2000 has a vulnerability that can perform local commands. There is also the possibility of a Trojan for the other party for 2000 Server.
However, now we have limited the IP, and the other's IP can't connect with us, even if the Trojan is installed.
Said them began to rebuild the database. We have backed up, so we are not a difficult thing to recover.
Soon, they a few let SQL reunite. We restart our command system.
I said to Xiaoyu: "The password must be replaced." Although I know this doesn't matter, the other party doesn't even have our machine. But now we need to be careful. Not afraid of 10,000, I am afraid.
"of course".
"Liu team, command system has recovered" small shout.
Liu captain her face slowed some. Go fast to the communication room.
Everyone saw that the system has nothing to do, the nervous atmosphere began to relax.
"Mom, the other party is really powerful, such a trick" 小余 笑.
"Oh, the soldiers don't have a tall, are we not so consumable?" Xiao Zhao said.
There is a buddy: "In fact, we should do this, we have to have the other's IP, we are actually destroying this command system is still as easy."
"If you can disguise the other's IP is just fine." A buddy said.
"To disguise the other party's IP to the other party's packet, it is not difficult, but it is necessary to establish a connection with the other party, it will not work." Old Zhang said.
Everyone laughs hahaha. It's all in line, knowing that this is just what we said.
In fact, the old Zhang said that the IP communication must be connected to the other party, you can't disguise IP. Now that the IP camouflage is now in essence is a network address conversion. That is to help you communicate with someone else's machine. Directly modify the source IP address in the IP package is possible, the other party can also receive, but the other party wants to connect to you, you must feedback a message to you, you change the IP package, you can't receive the confirmation message of the other party. Of course, it will not be able to communicate with the other party. So, many people think how to change how IP wants, this is not in line with network communication principles. This can only be seen in hacker movies and hackers novels.
Our work has recovered calm. Everyone started to work according to the work of the class.
Liu captain did not progress in our work. I have said that I have to ask the specialist to capture a headquarters of the other party. We have to have the other party IP, and we can make the other person. Even if the other party can restore success, at least everyone will make a flat hand.
Old Zhang said: Wait, I am a little eyebrow here. They can let them refuse to serve.
This is of course best, and Liu captain will come to see the progress of the old Zhang every day.
I didn't say the attack method of my Apache. It is not too late to have a ripe. In fact, everyone understands that the idea of the other party's headquarters is first used, obviously the other party is prevention. We now use someone's rotten and tricks.
Everyone is busy, both sides have started to work.
I saw the outside police soldiers added more than a dozen people. Yes, if the other party knows our location, send people to put our end, our information confrontation is complete.
At the 10th day, I was experimenting overflow data at the time. It is basically eyebrow.
I heard the old Zhang and shouted: "Success!"
Everyone went around, including Liu captain.
I see that I have communicated with my own program and the other party's 80 port. But the other party did not respond. Obviously hangs.
"I just tested my overflower, the other's RedHat 9 must hang it." Old Zhang was very excited.
We all returned to our machine, tested it, yes, the other party's RedHat 9 did hang.
Liu captain has a rare smile on his face, "said, so, we finally give each lesson!"
I quickly said to the old Zhang, don't attack it first. Be careful to be discovered by the other side. We will be difficult to succeed. We have the other party's vulnerabilities in his hand, and we will use it, let it get rid of the other party.
The first battle is very enthusiastic, everyone's enthusiasm is very high. You think, it is 10 days. There is basically no breakthrough. I actually use our IP to refuse the service. Can you not happy?
While Liu captler said: "Yes, right, Xiao Wang said," I went to the communication room again, I think it is a report. Ha ha.
The other party's recovery is very fast. After 2 minutes, their system was re-working. We estimate how it may be checking.
Liu captain organized us to meet and study the next attack plan. The old face is full of laughs. I can experience the joy of success. It feels very good.
"Old Zhang, you can't use overflow, let Redhat open a new port." I said.
"There is this possibility, I dare not guarantee. The other firewall is easy to find." Old Zhang said.
"Then I will go to the wood, the one of our specialty, the firewall can not sweep out" Xiao Zhao said.
"This vulnerability allows the other party to overflow, but to execute commands, there is no possibility" and said.
"I found a vulnerability here, let me do some commands. At least the IP limit in the other ASP is limited, the problem is not big" I said.
Everyone is excited. Old Zhang also glows.
"If you can get rid of the opponent's firewall, open an ordinary account, I will let him overflow to get the root right is no problem. But the action is fast. The other party's administrator is not a meal."
"Yeah, the action has already been seen fast, once we open a gap, the other party may discover immediately, so we must completely destroy the other party system with the fastest speed." Liu captan said.
If you discuss, everyone reached a consensus. Now, do not attack the other party, paralyzes each other. Then I and the old Zhang stepped up the attack program. After success, we will make a set of schemes, penetrate into the other party's information. Or thoroughly let the other system is paralyzed.
So everyone started working again. I am more and more difficult to debugging my and old procedures. Let the other party execute my order is not easy. Moreover, the program that is executed when the overflow is not too much. Only a little bit can be implemented. Therefore, performing the most useful and most exciting code is very difficult to choose.
For trials, we installed the same RedHat9 and Apache on the server and the command system for testing. You can't use the machine to do test.
With the actual experimental environment, I think the job is relaxed, I can immediately try it immediately. Even the problems did not find out at the beginning. For example, I found that I can write a program that overflows in Apache, and then incorporates some special data. Apache can write files on the server. I associate the overflow function has a Printf word, a big excitement, it seems apache Overflow on the output. And the problem is serious. But the new version has been added to this vulnerability. Apache on RedHat did not make up. Oh, heaven and help me! __________________
When any attempt can't change anything, you may wish to learn adaptation. Sometimes, an integration from the adaptation is more than the potential of life. When you have some conditions and capabilities, it will meet you naturally.
Time is constantly passing in silence, our team's work is also moving forward in one step. Old Zhang uses a overflow vulnerability in the Linux 2.4 kernel, which has been able to stop the other party. He tried to make further use this vulnerability, trying to let the other party perform its own code, but this work is very hard. From the old black face, and because of the debugging procedure, it can be seen that the progress is not large.
I found an overflow vulnerability of Apache's 2.044 version. Due to the actual experimental environment, I have been able to use this vulnerability to write files on the server. But because of the use of overflows, I can only write very little data, not just how to write, how to write it like usually.
Xiaoyu and Xiao Zhao have tightened the monitoring of our server. The brother of the information team also said that the set of command systems, trying to find more vulnerabilities, but because the other party defines IP, we don't have a way even if we know the other's weaknesses.
I am now thinking about how to use a vulnerability to attack each other.
To be old truth, if we use our current vulnerabilities, let the other party's server stop service, not a difficult thing.
However, I have always thought that the highest level of hackers is penetrating into the other party without being discovered. We all know, if the other party stops the service, the other's data will generally not lose, and the refusal service itself is telling the other person to attack. Once the other party is fully monitored, this time, it is difficult for you to get more permissions on the other server.
I want to penetrate the other party, and now I can only pass the 80 port. This other party is difficult to find. But the other party must also monitor. They are not a fool. It is impossible to let the anti-post can't connect your connection. I believe that the other party is also monitoring.
Through the vulnerabilities you know by both sides, the possibility of success is small, even if they are successful, they will soon discover.
How to do?
My head has become bigger.
Everyone is working hard. The sign of us here is silent. There is no smoke here, and our people here don't smoke. Now that smoking does not become?
Only the sound of the keyboard tap, silent, or silent.
Originally I would like to use this vulnerability of Apache to change the code of the IP qualified portion of the other party command system. However, the other's Log and monitoring systems will definitely discover. In this way, the other party will react immediately. I said, no matter how powerful, no matter whether you have a vulnerability you have, you still fight even if you are not as good as your network management. No way, the strong dragon is also difficult to fight the snake.
I tried it, using this vulnerability, I can get or read or write to the other party or the number of write bytes is less than
1024
Byte data, my heart is ecstatic.
I hesitated, I decided to take a risk. Whether this safe-cut is worth it, I have not sure it now. ignore him.
I quickly tap the keyboard and build the overflow data I want. Then trial on our server. Successful. There should be no problem, the main program I have tried many times.
I put my special data COPY on the browser, and open the main program, connect to the other party's 80-port, then I will send my overflow data, let the other Apache overflow, this time, I will put my other set The data is requested by the browser, and I don't have me, and the front of the other log file appears in my browser.
1024
One byte.
I read the Apache's Access.log file, which is detailed in detail the connection information on the other party. I saw a few IPs, but the following code is 400 behind, which is obviously rejected.
Of course, I also saw a few 304 code, this is a successful connection. Obviously this is the other's IP, huh, I want this, there is a total of 10 IP, I put them in the Notepad store.
Even if I am so motion, I am discovered by the other side.
Because the brothers who have been silent for a long time suddenly spoke.
"Strange, strange, I have just established a connection with the other party, and I've been broken away ..." Old Zhang seems to say herself. However, it's so quiet, everyone heard it.
"Yeah, although I can't access the other party's web, but I can establish a connection or now I am still broken." Xiaoli also said.
"Is it, the other party now IP verification is not from ASP, but it is connected. If this is, it is more difficult." Xiao Zhao also said.
I tried it with my own procedure. Sure enough, I am now being broken soon.
It seems that the little moves I have just been discovered by the other side. This is not difficult to understand, their monitored people are not eating dry rice. They must see me in the log, I have successfully connected it once. Although this time is very short, it usually does not discover, but now it is very good, the other party is monitored, will you miss?
Now that the other party has re-changed to an IP connection verification, we have to directly attack the other party's possibility of the server is smaller. Everyone is frustrating.
"Simply, we will refuse to serve, they start, we come again, let's do it very well!" Xiao Yu held the brain and looked at the chair.
The buddies of the old and the information team stopped to rest. You have a sentence. Everyone is planning to be alone.
"Server, it seems to be can't work, we will come from their client machine, come, come to lead the address." I said with a smile.
Everyone is shocked, there is no reaction for a long time. Because the attack conditions we were just known as the IP address of the other master server. In fact, when the real fight, even if the IP address can be difficult to know. Now, I actually say this, everyone is inner, can you be amazed?
I laughed and looked at everyone. After a while, everyone was around.
Everyone believes when seeing the IP address. Because they, I know that I have read the other party's log file. Because the format of that file, it is familiar with those who are proficient in the network.
I share the file. Everyone returned to the seat, while the Down file, he said: "It turned out that your guy got people's log files."
"You simply have their password files, we will run under the computer, if you are lucky, you may come out." A brother said.
"Oh, there is no way to log in to people, you know that the root password is useless." Old Zhang said.
"Just, or these IPs are really, these levels of subordinate units are much worse than they fight the team. Maybe we have made one, use him to do a springboard, enter the other party's Server, the other party is not easy to discover." Xiao Zhao Very excited.
"Don't be happy too early, can you get it difficult to say. Everyone is careful, don't grasp the attack, don't be discovered by the other party. Now I still want to engage in IP IP." I said. "OK!" Everyone cheered, we re-saw hope.
We divide this more than a dozen IP, everyone is responsible for several IPs. Avoid several people attacking a computer.
I am responsible for 4 IP. Not a network segment, it seems that these IPs come from different places. But according to my experience, these IPs come from our region, it seems that the IP of the other party commander is correct.
I don't have to conduct scanning other machines, and the other party is equipped with a firewall. I don't want to have no idea again, I was discovered by the other party.
As long as you send a packet, it will be found by the other's firewall under normal circumstances. As long as the other party discovered that I was scanning him, he had a guard, I have to attack it very difficult.
I am thinking about how to start. I guess the Microsoft system that their clients should adopt. If so, there is a lot of vulnerabilities that can be utilized under normal circumstances.
Despite danger, nothing is not made, it is always not a way.
I decided to take a machine to test it.
I pinged that IP, huh, Time Out. Not pass. It seems that the other party either does not boot, or there is a firewall. It is not a powerless possibility, it should be an anti-firewall.
I think this time the other side's firewall should record, I am in ping his message.
I immediately launched my connection program, try connecting to the opponent's port. These ports are the ports of some firewalls. I don't know why, most firewalls have opened ports, may be the news that their company sent them? This port can be connected. And the ports of different firewalls are also different. I tried all the ports of all the firewalls I know, and the last port was finally all right. connection succeeded. My luck is always bad.
The other party uses a firewall that we are familiar with, the company's previous text editing software is very good. Oh, there is a door, the company's firewall does not dare to compliment, I already know a vulnerability. Ha ha.
Take the other party has not taken measures, let's get rid of his firewall. I immediately sent a packet in the past, this packet, dedicated to this company's firewall, a hundred trials.
Oh, sure, the other party's firewall is exited. I ping each other, has responded normally. Hurry and scan, if someone discovers that the firewall has not worked. Just trouble.
At this time, it was time to scan. I started your own command-based scanner.
The result is constant.
I judge according to the data returned.
The other party is the computer that is actually the Window98 system.
My heart began to sink.
Don't look at the problem of Windows98, let him blue screen easy, but if you want to log in again, let's put a Trojan, but it is more difficult than Windows2000.
When Windows is designed, there is no consideration to do services, and even the features of remote logins are almost imperfect.
I saw a few familiar ports, I can let him blue screen, crash, but I can't log remotely.
My luck has always been good.
My mood is frustrated. Others have no news.
It seems that before using the next IP. I have to pray for God bless.
I would like to make that computer. Think not to cause the other party to pay too much attention. That's also.
When I was tested about there, I didn't find the other party's computer that the other computer can penetrate. I want the other party to crash without work, it is really easy. The computer of their underlying headquarters basically didn't prepaid. Many vulnerabilities. But they didn't open service, so I can't connect, put on the wooden horse. Can't put the back door, we cannot use this program to connect the other party's server.
Oh, in fact, technology is very helpless. The success of hackers is very random. It is often seen that many people on the Internet are looking for anywhere, in fact, no matter how powerful this hacker, a system that is well-prepared, monitoring the strict system, is very difficult to invade. It is also very naive of the technical level that can be used to measure whether a black website can be used. Regardless of your technology, no matter if you can write an operating system, you have to invade the others, the usual decision is the other party's preparation, not your technical level, the technical level is just the level of the leakage. If the other party does not have a vulnerability, there will be no way. However, there is no loophole in this world that is theoretical. Therefore, the hacker has existed this role. The existence is reasonable.
Other brothers did not find any vulnerabilities. The other party is almost all of the Window98 machine. It is too difficult to invade.
When I have dinner, everyone is very tired. Everyone is eating, there is no harvest, the result is similar to my effect.
The machines that other brothers encountered almost 98 machines. They have no way to penetrate.
To tell the truth, I am not familiar with Windows NT far from Windows 98. Because no one usually uses 98 to do a formal server. And let the 98 crash basket screen is really too easy. I have never look very much for 98.
However, if you don't configure 2000, for hackers, 98 is more secure. We are all desperate.
After dinner, I started to install a Windows98 with the old Zhang, and we all use the default installation. We want to find where you can use it.
Old Zhang and I belong to the debug level, we like to find a vulnerability, so that you can change it.
I am more despise the so-called "hackers" that I am in trouble. Now hacker has become a negative image, and these people can't get a dry system.
In fact, Hacker is not a derogatory word when the word is just produced. Even technical, or a commendatory term.
However, now many people, even the network principles don't understand, I think about the web page of people all day, and the rejection of people's servers. They are happy.
Many hacking tutorials on the Internet are beginning: Please start the scanner, just enter the ip of the XX section to the XX segment, wait for him to sweep, if you are lucky, you can see the broiler.
Halo, this is hacker? This is clearly in the Jianghu Lang, anyway, I've encountered a calculation, what the machine you are. Oh, in fact, 99% of the machine they found this is a personal computer, and there is no meaning, except as a soaking.
I am hard to understand that some people can't easily enter people's machines. If you change the homepage of people, you have to change it into a yellow page. Do you say this is not a metamorphosis?
Such people are now too much, and many black and other people websites are doing these people. However, these people have almost unable to enter some websites with some technical strengths.
As for what China-American hacking, there is any Chinese-Japanese hacker war, but also boring.
Many things in this world are not technically solved. People who do these things are people who don't understand politics. The government has no statement, you jump yourself, but also "Wars", how is the result?
In fact, some real hackers in the United States have not participated. Our country is also some young people who are generally not more than 30 years. Even so, we can compare our technology a lot more than people.
I have a hacker friend in Taiwan and the United States on the Internet, and their technologies are not changing. But they have never participated in such a boring event.
I will not participate in such activities, bored, and more dangerous. Maybe the government's wind direction changes. You are the world's first black passenger, in front of politics, you are just a poor insect. If you really patriotism, you don't want to say anything, do something practical. What is better than?
Old Zhang is a master of debugging, I see that he has started debugging the communication program of Windows 98. His action is very relaxed, it seems that it is not a substantive thing.
I am also bored in Windows98, I mainly look at the Windows98 default, what are the things related to Internet communications?
I will see the sharing first. Windows98 sharing is a popular vulnerability. Deciphering the shared password of Windows98 is simple. But the sharing is not open by default. In fact, the computers we just scan did not have a sharing, otherwise, I have been broken by us. It seems that this route is not passing.
I clicked on the network neighbor, I saw a buddy computer, I also saw the old computer.
I am right-click, select the property, select the tool, I saw the button of the web monitor. I am in my heart.
This is a computer used to monitor other network neighbors. If the other party has opened remote management, I can connect to the password, I can connect it and visit his resources.
I got a process, I tried to connect to the old computer, and I would like to prompt the password. It seems that Windows98 is open this server by default? However, if the old Zhang does not set a password, I can't monitor each other if I want to enter anything.
I quickly ran to the old man's computer.
"Old Zhang, Windows 98 opened a remote management, but before you didn't set a password, he refused to connect. We can find a way to let him accept the connection." I am excited.
Old Zhang is also excited, he knows what this means .. He quickly found that function, then set a password, I will connect it up from my computer. Of course, the password is still, I can modify the file on the other machine!
The program we connect is actually the NetWatch.exe program.
"Old Zhang, we follow this procedure, maybe you can find a loophole, 98 vulnerabilities are more famous. Ha ha".
"Good" The old Softice called again.
I also returned to my machine to start debugging.
The work of debugging procedures is really drum noise. This program is not encrypted, and it is not very difficult to track. It is annoying. At 12 o'clock, my mind began to be dull, I haven't found a vulnerability yet. I decided to sleep.
Before going to bed, I saw the old Zhang, what was in the book with a stroke, he was analyzing the data structure of the program and the other party.
I woke up at 6 o'clock, can't sleep, people who engage in computer, hanging out, usually, will not sleep late. Ha ha.
Old Zhang is still sleeping, maybe in too evening yesterday, his desk with a password on his desk.
I just sat in front of the computer, I woke up, I immediately said to me: "Xiao Wang, I found that program, if I submit a large packet, remote management server program, it will hang, but Windows98 Still working properly.
"Really, after the other party overflows, can the server connect?"
"Can, and ...........................................................................................................................................................................................................................................................................................................................
My finger has begun to start the program, I put the original packet of the packet, COPY, sent a data package to the old machine. Then start the WIN98 network viewer, enter the other party's computer name, sure enough, the password basket will lose a word casually, go in! I saw the other party's disk, I can upload the file. day!
Old Zhang, I am proud and excited, I laughed with his thumbs up.
If this is, we can connect to the other machine, then pass the back door and let the other party execute. Oh, isn't it successful? Think of this, I can't suppress an excitement!
However, I quickly found that this connection can only be connected by the other party's computer name and cannot be connected via IP. The other party's computer name and we are not a network segment, so it cannot be parsed. This connection is essentially TCP / TP, but use NetBeui, this protocol cannot be used.
It doesn't matter, I think I want. Start scan other IPs of the network segment where we attacked the IP. As long as we get one of this network segment, huh, huh, by him, we can enter the target computer.
I guess, the civilian network of the other party's headquarters. Other calculations are likely to be that their military is in use, and may be civilian. Exercise, everyone hides people. Are we not hiding in the school?
Sweeping these addresses, I didn't hesitate. The other party is impossible to have a great preparation, and people who use the computer are not necessarily a profession.
Soon, I swept a few computers. Today is not good, there is no directly to the password. But there are many machines that have no prohibited in an empty connection. Ha ha. I actually saw a 3389 port. Use the client immediately to see, a Chinese Windows2000 system. Enter the username of Administrator, look at, haha, how is my luck today? I didn't make a patch, and I didn't make it up!
This is also no wonder that ordinary people use the machine, how can it consider so much.
Nothing is hesitant, I used this vulnerability to open a super-authority account for 1 minute, huh, it doesn't matter, the other party will definitely find it. Moreover, I am enough for a few minutes, I don't dare to be interested in this computer!
I immediately put the attacker who wrote the old man, bringing the computer name of our target computer, starting attack! Then incoming, the old manifold can be connected to the program in 2000 and the other party.
I quickly passed to our goal machine to our latter programs and destroy the procedures for the opponent's firewall monitoring. Then change his launch profile. Exit immediately.
When I quit, I was relieved with my little.
We look at it and immediately start attack 98 procedures, let 98 cranes, easy. When I easily knocked into the 98 violent attack program, I was relaxed in my heart.
Sure enough, very fast, the other party's computer stopped responding.
The other party failed to crash. As long as he restarted, our latter program will work.
At that time, the computer we want to enter the other party is very easy.
If so, we have to penetrate the other party's server. Ha ha.
I am very excited with the old Zhang.
I took this gap, I have some songs "slowly come", and the melancholy song floats.
I like the songs, a little vicissitudes of life.
Don't be tight, some words are just habits, you should gradually learn to be calm, happiness has a little bit, the same day is sweet, you must know how to thank you. .
Don't tighten, slowly. . . . .
When the song was heard. I have seen the response information of our backdoor programs on the client program that I launched with Old Zhang.
Now we basically control this machine. According to the other party's protection, they are not big to find us.
Now what we have to do is to enter their servers through this computer.
It is best not to let them find. Finally, if so, we can't do it, we will engage in violent denial of service attacks.
We use our client to connect to that computer, we have started looking at the interests of the files on their machines. We have built a proxy server directly. It is a modified proxy, and we hide his interface.
Maybe they dream do not expect that we will get the IP of the following headquarters, and it is also successfully captured, so this is actually as long as you find the proxy server that can be discovered by the process. In fact, it is not found. The key is that they have never thought about it. Many things will not find anything without any preparation. A re-savvy person will make mistakes when you are in great ideas.
With a consignment, it is not that we are so powerful, it is indeed that the other party has not thought that if they know. It is necessary to break away, it is simply raised.
The next thing is very simple.
We will pick up a keyboard capture program immediately, and started him. We need to get the password they log in to their command system.
Then, I will wait for it to be tense.
We keep watching the captured keyboard information. But there is no information available. Several of the keyboard combination, we immediately entered their host attempting to enter their command system, all failed.
Time is waiting in our anxious waiting. . . . . .
By dusk in the afternoon, we finally saw a group of strings, when we cherished the publicly entered him to the landing page, and tapped the bus.
Hahaha, finally entered!
I didn't respond to the old Zhang I for 10 seconds, and our thinking is already failed. The number of TRY is too much, and the thinking is mechanically.
After 10 seconds, we shouted, I laughed. Old Zhang is almost dancing.
You think that our desperation is finally reached. Can we not be happy?
Everyone is coming up, Liu captain came over from the next door, asked: "How to pull, how to pull?"
"Old Zhang crosses the remote management vulnerability of 98, we have entered a computer of the other party's headquarters" I am excited.
"Yeah, I have got the password of the other party to enter the command system, we can see their command system." Old Zhang looked like a child.
I quickly knocked into the IP of the other party in the browser, the skilled input password, the other party's command system main menu entered everyone's eyes.
Liu captain stunned with other brothers, everyone immediately cheered.
"You have already made a proxy on their machines?" Liu captain voice a bit trembled.
"Yes". I replied.
Liu captain went to the newsroom immediately.
For a while, the Liu team came back. Let's meet. Everyone's excitement is almost overlying throughout the house.
For so long, our team finally made breakthrough progress, everyone is very happy.
Liu team began deploying the next plan.
Although the Liu team has no specific implementation, his thinking is not a general way.
"Below, we have absolute active. Just king got the IP of more than a dozen opponent's subordinate headquarters. We can use the vulnerabilities of Lao Zhang and Xiao Wang to attack, and correctly overcome more the subsidiaries of the other. Let the post-construction agent. Captify the password, we don't attack the other's primary server, we keep this state is good. We can see the other's command system, we can understand their partial action deployment, this for us The victory of the exercise can be said to be absolute.
From now on, in addition to sending a person to monitor our server, and the backup system, all the people all attacked the individual's subordinates, and then we also put all the contents and intelligence of the command system to see on the computer. Pass back. We put them on our server and let our headquarters can see. . . . . Liu captan said that his command system also had permission. The subsidiary unit is not all the information can be seen, and you can only see the information related to your troops, other things that have nothing to do, they can't see it.
So only one of us, you can't get too much intelligence. We must continue to overcome more computers. The other party is not a fool, they will not let the subordinate unit know all the information, because if the subordinate unit is being connected by the other party, the consequences are unimaginable.
It doesn't matter, we seem to feel that victory is in front of you. I think other IPs should be a thing or later.
In the evening, I feel relaxed with old Zhang, I even heard the old mouth whistle and knock on the keyboard.
Other brothers are attacking other computers in the subnet where IP is located in order to take advantage of that old-standing attack program to obtain absolute permissions of the target computer.
Everyone is in line, once the method is open, no more than a multi-have tongue, each is attacking his goals.
Liu captain into the communication room and our studio into and out, and keeps back the other information from the overcome computer, then report to the superior.
Everyone is busy with nervousness.
The newspaper continued, Xiao Zhao and Xiaoyu successfully overcome a computer, and the old Zhang also overcome one. The military people of the information team are not waiting for the leisure generation, and they have successfully entered the other's computer.
By the next morning, we found more than a dozen IP overdes half. We have more and more information. The busy Liu team ran into the run.
But everyone is happy.
We can say absolute advantages in confrontation. They fight against the team, they can't find that we have gained a lot of intelligence. I guess they definitely wonder, why don't we attack their computer DDOS?
They surveillance connected all their own IP, they certainly found that we have gained their intelligence through the machines underwater. Haha
In fact, many systems have an inconspicuous place to fail, resulting in failures of the entire system. Really, in terms of computer security, any small 倏 倏 can bring fatal consequences.
Nowadays, many software designers don't know if they have questions about security, this is definitely not a good thing. Although many designers are very familiar with the language and systems he say, it is often a disaster in the implications of security issues.
For example, there are many interactive forums, in fact, most of them have such problems. They are all repaired, in the early days of the design, few people considers safety issues.
Many software features very good design, but the security issue is very poor.
My image is the deepest computer protection software called XX bodyguard. To tell the truth, I have admired, I also have to make such a procedure, but they have a very big vulnerability, which can give almost no effort. Their super user's password!
I fell. I want to designer is a master of a computer, and it is very clear to the underlying. But he is definitely a security newbie, the safety awareness is very weak, and this kind of curse!
That night, I slept very well.
In the next few days, we have been very easy, and the Liu's face is always smiling.
He keeps us a discipline, and our blue is now mastering absolute initiative.
Oh, this is of course. Now everyone is a exercise, not really desperate. Who mastered the information, it can be said that they will win.
We are now almost more than the other subordinate units. Do you say that the other party can play our basketball?
Then our days are better. Everyone has begun to relax. Even the old Zhang gave up the idea of implementing attacks on the other party. This although we didn't get the control of the other party, our most important purpose was reached. What is going on? In this way, the other party is not easy to find that we have wanted everything.
I secretly opened QQ, Wow, God, I miss so many days, Xiao Min's avatar on QQ is not stopped. There is also a small forest police officer.
Look at Xia Min gives me.
"are you fine?"
"Do you not access the Internet?"
"Why don't you come back?"
"Halo, can the phone can not be used?"
"Is there a short message to see?"
"Hey .... I miss you"
"When are you coming back?"
My nose is sobs. I have been isolated from the world for so many days. My mobile phone is placed in the military region. It is not allowed to bring it.
Xia Min, are you okay? The guitar in my family is not touched for a long time.
Then look at Xiaolin police officer.
She didn't know where I went.
She asked all technical issues.
I didn't have a reply.
Here, I have followed: "People ????"
There is nothing wrong.
I fly quickly, "I am very good, I will come back in a few days, my mobile phone can't be used, QQ is also my stealing."
Leave Xiaolin police officer: "In the business trip ...".
Then shut down QQ.
Point to open a water-wood epitaph, start to live. . . . . .
I have a little thinking home.
Unconsciously, I have been 20 days in the army. How much time is specifically, I don't care.
In recent days, too nervous, too excited. The debugging program is too tight, recently obtained the information of the other party command system, so that I am too excited.
I am more preferred for assembly levels. In fact, there is also a lot of tools that have been compiled into a corresponding language in a program. Most of the service programs are written in C. Some small programs under Windows, even a lot of VB written. Many procedures are generally not found to have logically vulnerabilities from source program. Because this vulnerability is mostly checked out in the test phase.
But if you directly reach the compilation instruction, some logically don't have questions, because the memory is allocated, the function you designed by BUG is mixed together. The vulnerability will appear.
The debugger is really hard. Now the new generation of peers, people who can eat this bitter is not much.
You look at the popularity of the website to study debugging and compilation, you will understand. Several sites I like to have basically striped in other situations.
I went to the army, I really didn't regret it. I met a strong person, old Zhang. Old Zhang is a real hacker. He has an incomparable endurance and solid foundation. However, I have never heard that I am boasting what I have ever black in front of me. Really, there is no one. Old short, fat, wearing deep myopia glasses. Walking on the street, you will never notice him. However, he is a real hacker.
The hacker is generated from the beginning, which is not destruction, he represents a superb technology. Now those who have the data to attack others, destroy others, they are not true hackers.
Lao Zhang solid compilation, and the superb commissioning of the Windows system, I feel admired. Although, I may also be very high in the status of my heart.
In fact, there is still a little more that I admire my most admiring is the temperament of the computer worker who is revealed in his bones.
Yes, it is temperament. That kindergress, even if you don't talk, you can feel the kind of temperament!
I have always believed that the kind of quality of professional computer is definitely not a non-computer professional actor to perform. This is also an important reason why the computer workers cannot satisfy other film works.
I have seen a series of consecutive dramas "One network" is the starring of Lu Shi, as for the people's network cable, depending on an email address, enter the password to log in, then successfully obtain the password, then find it can't connect, The final conclusion is that someone else did not boot! These don't say it. It is a matter of temperament, and the land is not like a computer worker. Really unlike, that kind of temperament can not be installed. Old Zhang is very leisurely, but even if he is leisure, we still make us feel that he is doing serious things.
He continued to study the system vulnerability of the Red Hat 9.0.
Now our basketball has achieved absolute advantages in the exercise, because our information we have learned, the basic Red Army is playing position. This is the Liu team. His face smile is very bright.
I am still going to scan the other party's servers. At the same time, I will focus on monitoring our server. I don't want our server to be infiltrated by the other party. Everything is normal, anything, it is impossible to have a miracle. Miracles typically appear in film and television works. Life is life, our server is just 80, others are based on package filter check IP, some people are worth 24 hours, the other party has no breakthrough.
I estimate that the Red Army has not been good for two days. They are sure to check how their intelligence is leaking. I believe that they may be desperately inspected in the past few days, we have penetrated.
Oh, don't be busy, believe in yourself, we are not gods, we don't penetrate your server. Just as you can't penetrate our server.
We just gave a lifetime of your headquarters.
I think they know that we don't know those IP, so thinking is not thinking in this direction. Once the thinking occurs, even if we look simple things, I think they can make them unreasonable.
Time is like this, there is two days left at the end of the exercise!
People in our group are happy, and finally can leave this house. For so many days, we have a lot of conflict, but fortunately we have a computer. For our computer fans, there is a network with a computer.
Liu team opened another meeting. This meeting is naturally different from the last atmosphere. Because we are full of victory.
The atmosphere is very relaxed, and the Liu team has arranged the deployment of the last two days.
The final task is to let the other party denial! Because the exercise is basically over. Their intelligence is basically not used, in order to prove that our strength of the detachment, we let the other party's server can't work properly, but also show our strength, let the superior know our results!
Liu team hesitated for the issue of attacking the subordinate headquarters we penetrated.
Finally, I decided to attack the computer we penetrated. And it is necessary to completely clear the back door left by our last time. Try not to leave any traces.
I think Liu captain may want to keep a little secret as a next confrontation.
This thing is not complicated, but if you tell others about the answer, you have no tricks next time. It may not be a way at it!
With the mind, if their subordinate command is slightly strengthened, we do have no way to get the other party's intelligence, and it is more impossible to penetrate the other party's computer. Basically, everyone has no way.
The hacker is like this. Before you attack, no one can guarantee that it will be successful. "Flies don't focus on seamless eggs" is used to describe the relationship between hackers and websites. Although the real hacker is not a flies. Ha ha.
I am now considering how to launch a denial of service attacks directly to the other party. If you take a slap in the machine, don't say that it is possible to refuse the service. But this is bound to leave a trace for the other party. The other party is not a fool. They will definitely find the attack record from their IP, which is not to expose our means? Liu team wants us not to expose, obviously this is not good.
We now use the old-core overflow vulnerability of the red hat 9 discovered by old Zhang, and the overflow vulnerability I found. We can't directly achieve attacks. Because the other party has already made a pack filtering, it is likely to install a firewall. Because the other party directly filters the IP package. More books don't respond to our data, so overflows, of course, no comment.
Haha, it's okay. It is necessary to refuse to serve me.
First, I use the tracert command to check the address of the router where our target opponent server is located. Since we are all areas, it is not a lot of nodes.
Direct attack router, as long as his router does not work. Hehe, the server is broken outside. Although there is no refusal service, the effect is the same for others. However, all the machines forwarded by the router cannot be online, and the face is too light is the policy. I don't want to use this trick.
In our domestic network, many people don't know, in fact, the router is a safe big risk. Since most of the "fake hackers" who like to make the destruction are not deep, and their general people cannot touch the router, so the understanding of the router is almost equal to 0, of course, can't talk more. The online attack tutorial can be used almost all attacks under Windows, so you can understand the reason. Because Windows is everywhere in our country, from this point, saying Windows is not safe, it seems that it is not very fair, the truth of the tree, I think everyone should understand. There is also a operating system in the router, is also a software, his design level, telling the truth, and is more simplicity than Windows. His designer's level, the gap is also very obvious than the designers of other operating systems.
Since he is single, it does not consider compatibility and ease of use, etc., the general administrator does not allow remote logins, and the person who knows the router is very small, so his security issues have not been shown. Sometimes occasionally crashing state, the administrator is generally reboot, but it is OK.
Also because of this, even if many router administrators are familiar with those orders, they don't know his working principle. Because routers are usually maintained by the manufacturer.
Even the Unix has a lot of vulnerabilities, what is the operating system of the router? So the loophole of the router is actually a lot. Of course, the router is generally unbearable. Because you can't log in remote, the general administrator will not open. But the vulnerability of the router refused service is really a lot. Moreover, our domestic administrators have a problem, and they often make aware of the patch of the operating system, but the patch of the OS of the router, many administrators have no management.
Therefore, the possibility of reminding such a router to refuse the service is very likely.
And after you attack, administrators generally think that the general crash, most of them are Reboot. I will not find the reason at all, and I will not suspect that some people attack.
I have used a network of a company, and their routers are often dead. Later I found that their routers have denial of service vulnerabilities, which is likely to attack. But each customer calls, their administrators think may be unstable. To now, the network is often broken, each time their administrator Reboot router solves the problem.
However, use the router attack, not necessarily success, and is not the best way, so I should continue to think about it!
Perhaps, I was influenced by the thinking, I started to sweep the other IP of the subnet where our opponent's server, I hope I can find a machine in other subnets where that server is located, attack him, then let yourself and the server becomes a child. The network, this attack is much likely, such as the ARP spoof attack is very obvious to the exchange-exchanged network effect, and now there is almost no good solution. Ha ha. I'm trying to pay attention, I started scanning, huh, huh, this subnet is obviously the army machine, the protection is more strict. It is basically not swept to a very simple loophole. However, most of them are 2000 machines, and there are a lot of ports, which gives me hope. Ha ha.
The 135 and 139 ports are almost every machine, but these two ports, the refusal service is OK, I can't do it.
You must find additional ways.
I finally found a 1433 port on a machine, huh, if I didn't guess, it should be MS SQL Server. Haha, this thing has a local command vulnerability.
Oh, if the password is deciphered by me, he is dead. . . . . .
When I saw the 1433 port, my heart was a bit confident.
To tell the truth, the current system and server software are getting more mature, and the loopholes are getting less, especially the WWW server, can be said that if you use a good software, security is very good. I believe that one day, hackers will be less and less.
Although it is not performed, it will be less and less like a fierce tiger. Because the software will become more mature under most computer workers, the space of hackers will get smaller.
Although, there is no view of the absolute correct program, but I still admit that the space you can use is getting less and less.
However, with the application of the database system in the network, the database's attack gradually became a new goal of the hacker attack.
To tell the truth, I can't understand the server software that actually uses MS on the Internet.
If you do a desktop, I always think that MS is No.1. Although the Mac is excellent, it is even more powerful from a general purpose. The choice of the market is definitely not messy.
But if you say that you do a server, there are too many things, no matter what, MS is no.leven. Oh, ranking last.
Say the operating system, inexpensive, even free, stable, and less little Like UNIX system.
On server software, some of the world's enthusiasts have their own Apache Project, which has emerged so much. Also free, why not?
On the database software, if you have money, you will use Oracle. If you have no money, use postgreSQL, and you will use MySQL. Why is MS SQL?
MS SQL is powerful, easy to use. However, this power has hidden too many vulnerabilities. And it is a vulnerability to perform local commands, which is fatal for a system!
Special small large commercial database with MS SQL.
I was tested for Oracle, I have tested many Oracle databases, but I failed.
A network administrator must be comprehensive. Many situations are not to understand network security, understand network security and don't understand the database. Therefore, the vulnerability will appear.
MS SQL is the same as the patch is also useless. Oh, I tested, change some programs slightly, sang to attack!
"Little King, come over" old Zhang shouted me.
I have seen it in the past, huh, old Zhang, and I have just been attacking 98, thinking is the same as me. He is also sweeping the machine. He also found too much MSSQL machine I stared.
"I am also staring at this machine" I said faintly. When the old debugging procedure, like a child, there is still a song in his mouth. However, the basics left made me not listen to what song.
"This guy is open, we decide his password to see how it? I think his password is impossible.". Old Zhang said.
"This method is stupid, if the other party does not add security strategy, the possibility of success is relatively large."
"A machine may not work, we will do more machines, how?" Oh, this is a public machine, not white. Ha ha.
"Why, do you want to engage in a cluster?" Old Zhang smiled and looked at me.
"Oh, let's try it, die of the horse as a live horse." I am very interested.
"Okay, it's okay," is also interested.
Calculate, Linux system is much better than Windows. We have installed our notebooks a simplest Linux. In this way, we have 3 machines, plus that server.
Then I find a MOSIX online, this distribution is good, he can move.
Let us start everything, it is 12 o'clock in the evening.
Opened our multi-threaded SQL password test program, and then went to sleep. We have opened a total of thousands of threads, and the basic three machines have been installed in full load.
I didn't think of it, I didn't think of it, I was shouted in the morning.
I know, I know how to open my eyes: "How to pull?"
The old face is smiling, huh, I saw a bright face swaying in front of me, I can't believe it is old. Ha ha.
"The password is coming out, the password is coming out."
"Will n't so fast, huh, you lie to me."
"Really, really, come out, what is your guess code?" Old Zhang continued to laugh.
Didn't see the old Zhang so happy.
I quickly rushed to the machine, and the number of processes in our cluster software have returned to normal. That is, there is no additional process load.
Obviously the password test has ended, the condition ended is of course detected, the correct password.
I skillfully knocked out the command of the password, the password is actually
123
321! I am dizzy, it is no wonder that I am so happy.
"I rely!" Came, and then laughed!
The owner of this machine seems to not know how dangerous his password.
Don't laugh, if you don't have a lot of tutorials online, Wan Yu, many people passwords will not be set! This is also aware of the password.
Unfortunately, this password is too simple.
"Unfortunately, my cluster" I didn't have a password, which was a wonderful. Is it too easy to get something, feel not precious?
Take him, the purpose is to achieve it.
The following work is simple.
Use this SA account to log in to the other party's SQL Serve, and then execute a local command.
Forget it, the uploader is too much trouble.
I simply opened the other party's Telnet. Then I built a hidden account to join the Administrators group.
Change the NTLM authentication method of Telnet to 0. OK, everything goes well.
After connecting, the implementation of the local command is much easier. I saw it, the above documents were messy. Didn't see useful information. It doesn't matter, as long as you can enter the subnet of our goal. The possibility of success of our attack is much better.
Excited, I have an attack with the old discussion. The exercise is over.
"It seems that it is not a door to penetrating the other party server.
"Oh, right, the other party's server defense is too dead, they basically have an external active communication." "Inti-service, how? What is your way to use?"
"Either use ARP or directly attack the router." I said.
"Oh, enough." Lao Zhang also thought of it.
"Liu team, can you start attack?" Old Zhang yelled.
Everyone came around.
"Of course, you can end today. Have you found the method?"
Old Zhang said to everyone to everyone, everyone has no opinion.
Liu team also puts light.
"Okay, this is the same," Liu team and everyone are all around me.
I immediately launched the ARP spoofing attack program on the Too computer we overcome. For a while, the other party's server has emerged.
This method is very effective in the local area network. For the network of hub, the success rate is almost 100%. For switch environments, administrators will have effects if they are inappropriate.
In fact, the principle is simple, because the communication of any agreement in the LAN is actually based on the physical address of the NIC. Just send some interference and error messages when you confirm the correspondence of IP and physical addresses, let the server or switch to determine the mistake, and the effect is reached.
I want to design the original newsletter, the designer did not think of this can be made!
In fact, the network is full of fragile. The current people are getting deeper on network research, and many problems that have not been considered now expose. Sometimes it really happens to solve the embarrassing situation.
Other buddies have not stopped testing the other party, and has always been Time Out. Unable to connect. The other party's server has a phenomenon.
This slant network is unable to find the reason from its own server.
Oh, they are dead.
Where do they think about in fact our attack computer and their servers in a subnet?
Nothing dramatic transformation, changed us, there is no way as we do. The only mistake is to give us several IPs. I think they are not a fool, they are definitely scanning our subnets, everyone is using the civil network. Maybe our luck is better, or the other users of our subnet do not boot or protect the protection, anyway, the other party does not penetrate into our subnet. If they are infiltrated, I can engage in ARP attacks. But until the end, our server is still normal.
Obviously they did not penetrate our subnet. Otherwise, we face ARP attacks, it is difficult to have a good countermeasure in a short time.
The last victory belongs to us, the blue army.
I would like to attack the router, but I think about it back to a lot of innocent people, I finally gave up.
One of the most annoying things that is the most annoying thing is that the network suddenly breaks. I think others will not like this.
When the Liu team came from the communication room, his face was laughing. I am full of appreciation for my old eyes.
When you pull back the military in the evening, the atmosphere is completely different.
Still the camouflage Evico, but the window opened. The soldiers of the police are not waiting. Also give us a joke. Several "militia" has been very familiar with the rest of the start. In their words, there is already a "revolutionary friendship." Especially I and old. It is simply iron buddy.
Start still feel that the old movement is. But encounter a peer, and the old can absolutely use an extrovert direction.
Old Zhang smiled very much, and there is no scruple. I felt in the first time, the old Zhang was very "childlike".
I don't know why I think of this word, but I feel like this is the case. Heart has no city, technology is all of his life.
I like people like this, there are not many people now. I saw it everywhere, I didn't learn the face. People like old Zhang may not like to like it, but I really admire such a person, even though I can't do this.
I really admire the old people such as the old, this is the truth.
Inside the military, there is a neat soldier and military vehicle. But we obviously feel the atmosphere of the joy of the air.
When you come out, the tension is completely different, although the car is still those cars, people are still those people, the place is still that place. But when I left, I was separated.
Can you get a big victory, can you be unhappy?
Does anyone know that there is a part of our information against the detachment?
I thought in my heart, I looked at the soldiers whispered, and I picked a pride.
The feast is less than the feast.
The dishes in the military cafeteria are absolutely best in the big pot. Anyway, I think it is better to eat more than the things in the cafeteria, maybe it is very mood?
I feel bored on those scenes. From the head to the end, my face is stunning, attracting a group of toasting people. But I will be able to serve.
Liu team seems not high, but there is no way, his goal is too big, when we leave, Liu team is basically a silent speech.
In the evening, I didn't talk to the old Zhang, we opened the military notebook that followed us for more than 20 days, and gently used to touch its face.
I found a song, it is the first English song, I want to take tears.
The name is Sailing.
I am Sailing, I am Sailing Home Again Cross The Sea, I am Sailing Stormy Water, To BE with you, to be free.
I am Flying, I am Flying Like A Bird Across The Sky, To Be with you, to be free ..................
....................
What I heard, I heard a tragic courage, an unyielding spirit, this is also a hacker's spirit.
That night, I didn't know when I was asleep. I saw myself sailing at sea. . .
Postscript: I looked at what I wrote today and I feel unlike novel. It is a hacking tutorial. Oh, I am really regrettable. I am almost talking about technical issues because I considering a lot of views raised by netizens.
This is not what I want. I have to gradually fade in the future, my purpose is to let people who have a little computer knowledge can understand this novel. I can like this novel.